TELETRAFFIC THEORY APPLIED TO THE ANALYSIS OF HASH-STRUCTURED FILES

被引:0
|
作者
COOPER, RB
SOLOMON, MK
机构
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Certain hash-structured files consist of sequence,s (chains) of computer memory locations (slots) into which records are inserted, and from which they are later retrieved or deleted. If we assume that the records arrive to the file according to a Poisson process for insertion into a chain (randomly selected by the hash function), and reside in memory for a random length of time before being deleted, then we can associate this with a teletraffic model in which the records are ''calls'' and the slots in the chain are ''trunks.'' In particular, we consider two models: (1) hardpack, where a deleted record is immediately physically removed from the file and is replaced by the last record on its chain, and (2) softpack, where a deleted record is marked, and a subsequent arriving record is written over the first marked record on its chain. The slots can be accessed individually or in groups (called ''buckets''). In each case we are interested in the length of a successful search (the number of buckets inspected until an arbitrary record is located) and the length of an unsuccessful search (the number of buckets inspected until it is determined that an arbitrary record is not in the file). If we identify these file structures as analogous to trunk groups with ordered hunt, then these models can be analyzed using results obtained many years ago (in particular, Kosten (1937) and Burke (1971)) for teletraffic applications, results which are not well known or easily accessible to the database-performance-analysis community.
引用
收藏
页码:336 / 341
页数:6
相关论文
共 50 条
  • [1] A UNIFIED ANALYSIS OF BATCHED SEARCHING OF SEQUENTIAL AND TREE-STRUCTURED FILES
    LANG, SD
    DRISCOLL, JR
    JOU, JH
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1989, 14 (04): : 604 - 618
  • [2] Teletraffic analysis of energy-efficient intruder detection using hash function techniques in images for remote monitoring in Wireless Sensor Networks
    Orea-Flores, Izlian Y.
    Rivero-Angeles, Mario E.
    Onofre-Soto, Ana L.
    Azpeitia-Rebollar, Edna G.
    Torres-Cruz, Noe
    Villordo-Jimenez, Iclia
    Pretelin-Ricardez, Angel
    Menchaca-Mendez, Rolando
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [3] Mathematical Theory of Teletraffic and Its Application to the Analysis of Multiservice Communication of Next Generation Networks
    Basharin, G. P.
    Gaidamaka, Yu. V.
    Samouylov, K. E.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2013, 47 (02) : 62 - 69
  • [4] AN ANALYSIS OF THE CAPACITY OF INTERNATIONAL TELEPHONE LINKS OF THE GULF STATES USING TELETRAFFIC THEORY ALGORITHMS
    ALGAMDI, AM
    BAKRY, SH
    JOURNAL OF ENGINEERING SCIENCES, 1986, 12 (01): : 69 - 81
  • [5] Structured analysis of conservation strategies applied to temporary conservation
    Moilanen, Atte
    Laitila, Jussi
    Vaahtoranta, Timo
    Dicks, Lynn V.
    Sutherland, William J.
    BIOLOGICAL CONSERVATION, 2014, 170 : 188 - 197
  • [6] SIGNAL THEORY APPLIED TO ANALYSIS OF ELECTROENCEPHALOGRAMS
    LOWENBERG, E
    IRE TRANSACTIONS ON BIOMEDICAL ELECTRONICS, 1961, BME8 (01): : 7 - &
  • [8] Dempster-Shafer's theory of evidence applied to structured documents: Modelling uncertainty
    Lalmas, M
    PROCEEDINGS OF THE 20TH ANNUAL INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 1997, : 110 - 118
  • [9] INFORMATION-THEORY AS APPLIED TO SPECTROCHEMICAL ANALYSIS
    ECKSCHLAGER, K
    KEMIAI KOZLEMENYEK, 1979, 52 (1-2): : 141 - 146
  • [10] Formal concept analysis as applied lattice theory
    Wille, Rudolf
    CONCEPT LATTICES AND THEIR APPLICATIONS, 2008, 4923 : 42 - 67