Estimation of False Drops in Set-valued Object Retrieval with Signature Files

Advanced database systems have to support complex data structures as treated in object-oriented data models and nested relational data models. In particular, efficient processing of set-valued object retrieval (simply, set retrieval) is indispensable for such systems. In the previous paper [6], we proposed the use of signature files as efficient set retrieval facilities and showed their potential capabilities based on a disk page access cost model. Retrieval with signature files is always accompanied by mismatches called false drops, and it is very important in designing signature files to properly control the false drops.

[1]  Christos Faloutsos,et al.  Description and performance analysis of signature file methods for office filing , 1987, TOIS.

[2]  Klaus R. Dittrich,et al.  On Object-Oriented Database Systems , 1991, Topics in Information Systems.

[3]  Kam-Fai Wong,et al.  A Superimposed Codeword Indexing Scheme for Handling Sets in Prolog Databases , 1991, DASFAA.

[4]  北川 博之,et al.  The unnormalized relational data model : for office form processor design , 1989 .

[5]  Tosiyasu L. Kunii,et al.  The Unnormalized Relational Data Model , 1989, Computer Science Workbench.

[6]  David Maier,et al.  Readings in Object-Oriented Database Systems , 1989 .

[7]  Kotagiri Ramamohanarao,et al.  A Superimposed Coding Scheme Based on Multiple Block Descriptor Files for Indexing Very Large Data Bases , 1988, VLDB.

[8]  Christos Faloutsos,et al.  Signature files: an access method for documents and its analytical performance evaluation , 1984, TOIS.

[9]  Won Kim,et al.  Introduction to Object-Oriented Databases , 1991, Computer systems.

[10]  Tosiyasu L. Kunii,et al.  The Unnormalized Relational Data Model: For Office Form Processor Design , 1990 .

[11]  FaloutsosChristos,et al.  Description and performance analysis of signature file methods for office filing , 1987 .

[12]  Hans-Jörg Schek,et al.  A Signature Access Method for the Starburst Database System , 1989, VLDB.

[13]  Simon Stiassny Mathematical analysis of various superimposed coding methods , 1960 .

[14]  David Maier,et al.  Associate Access Support in GemStone , 1991, On Object-Oriented Database System.

[15]  Elisa Bertino,et al.  Indexing Techniques for Queries on Nested Objects , 1989, IEEE Trans. Knowl. Data Eng..

[16]  Hans-Jörg Schek,et al.  The relational model with relation-valued attributes , 1986, Inf. Syst..

[17]  Hiroyuki Kitagawa,et al.  Evaluation of signature files as set access facilities in OODBs , 1993, SIGMOD '93.

[18]  Elisa Bertino,et al.  Object-Oriented Database Systems , 1993 .

[19]  Kotagiri Ramamohanarao,et al.  Multikey access methods based on superimposed coding techniques , 1987, TODS.

[20]  Stanley B. Zdonik Object-oriented data model , 1990 .