2009
DOI: 10.1504/ijbidm.2009.029076
|View full text |Cite
|
Sign up to set email alerts
|

Fragmenting very large XML data warehouses via K-means clustering algorithm

Abstract: XML data sources are gaining popularity in the context of Business Intelligence and On-Line Analytical Processing (OLAP) applications, due to the amenities of XML in representing and managing complex and heterogeneous data. However, XML-native database systems currently suffer from limited performance, both in terms of volumes of manageable data and query response time. Therefore, recent research efforts are focusing on horizontal fragmentation techniques, which are able to overcome the above limitations. Howe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 42 publications
(9 citation statements)
references
References 56 publications
0
9
0
Order By: Relevance
“…An obvious extension of the work described in this paper is to use other benchmarks in order to include other workload activities. Also, we plan to further improve the characteristics of our framework by integrating solutions for dealing with novel aspects of massive big data set processing, on top of which workloads may be still defined, such as data compression techniques (e.g., [15]), fragmentation approaches (e.g., [13]), privacypreservation approaches (e.g., [14]) that, particularly, may be extremely useful combined with malware detection issues.…”
Section: Concluding Remarks and Future Workmentioning
confidence: 99%
“…An obvious extension of the work described in this paper is to use other benchmarks in order to include other workload activities. Also, we plan to further improve the characteristics of our framework by integrating solutions for dealing with novel aspects of massive big data set processing, on top of which workloads may be still defined, such as data compression techniques (e.g., [15]), fragmentation approaches (e.g., [13]), privacypreservation approaches (e.g., [14]) that, particularly, may be extremely useful combined with malware detection issues.…”
Section: Concluding Remarks and Future Workmentioning
confidence: 99%
“…An obvious extension of the work described in this paper is to use other benchmarks in order to include other workload activities. Also, we plan to further improve the characteristics of our framework by integrating solutions for dealing with novel aspects of massive data set processing, on top of which workloads may be still defined, such as data compression techniques (e.g., [14]),jragmentation approaches (e.g., [12]), privacy-preservation approaches (e.g., [13]) that, particularly, may be extremely useful combined with malware detection issues.…”
Section: Concluding Remarks and Future Workmentioning
confidence: 99%
“…In this case, our approach can be extended as to capture this important scenario as well, e.g. by exploiting data fragmentation techniques in distributed environments (e.g., [4], [5], [7]), as to improve performance. APPENDIX CPU2006 SPEC benchmark.…”
Section: Final Remarks and Conclusionmentioning
confidence: 99%