Skip to main content

Implementation and performance evaluation of compressed bit-sliced signature files

  • Performance Evaluation
  • Conference paper
  • First Online:
Information Systems and Data Management (CISMOD 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1006))

Included in the following conference series:

Abstract

This paper describes design and implementation techniques of the signature file access method. It has been implemented and embedded in RICOHBASE, a commercial DBMS product based on an extended relational data model. This is our first experience of practical implementation of this access method, although some experimental implementations exist. We discuss some design topics which turn into issues in practical environment.

We also describe the results of experimental simulations which were performed upon the implementation of the signature file access method in RICOHBASE. From these results, it is possible to examine characteristics of the signature files. The performance of the signature files is largely dependent on the tuning of parameters. The results of the simulations indicate changes in performance changes in the values of the parameters. Furthermore, the results give values of the parameters that achieve optimal performance in text database applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, P. P.: The entity-relationship model: Toward a unified view of data. ACM Trans. on Database Systems, 1(1):9–36, Mar. 1976.

    Article  Google Scholar 

  2. Faloutsos, C.: Access methods for text. ACM Computing Surveys, 17(l):49–74, Mar. 1985.

    Article  Google Scholar 

  3. Faloutsos, C.: Signature files: Design and performance comparison of some signature extraction methods. Proc. of ACM-SIGMOD 1985 Int'l. Conf. on Management of Data, Austin, Texas, 14(4):63–82, May. 1985.

    Google Scholar 

  4. Faloutsos, C.: Signature-based text retrieval methods: A survey. IEEE Data Engineering, 13(1):25–32, March 1990.

    Google Scholar 

  5. Faloutsos, C., Chen, R.: Fast text access methods for optical and large magnetic disks: Designs and performance comparison. In Proc. of the 14th Int'l. Conf. on Very Large Data Bases, Los Angeles, USA, pages 280–293, Aug. 1988.

    Google Scholar 

  6. Faloutsos, C., Christodoulakis, S.: Signature files: An access method for documents and its analytical performance evaluation. ACM Trans. on Office Information Systems, 2(4):267–288, Oct. 1984.

    Article  Google Scholar 

  7. Faloutsos, C., Christodoulakis, S.: Description and performance ayalysis of signature file methods for office filing. ACM Trans. on Office Information Systems, 5(3):237–257, July 1987.

    Article  Google Scholar 

  8. Furuse, K.: Implementation fo signature file access method in a dbms. Technical Report of IEICE DE94-58, The Inst. of Elec., Info. and Comm. Eng., Sep. 1994. (in Japanese).

    Google Scholar 

  9. Kanasaki, K.: Database management system g-base. Ricoh Technical Report 15, Ricoh Co., Ltd., Apr. 1986. (in Japanese).

    Google Scholar 

  10. Kunii, H. S.: Graph Data Language: A High Level Access-Path Oriented Language. PhD thesis, The University of Texas at Austin, May 1983.

    Google Scholar 

  11. Kunii, H. S.: Graph Data Model and Its Data Language. Springer-Verlag, 1990.

    Google Scholar 

  12. Lee, D. K., Kim, Y. M., Patel, G.: Efficient signature file methods for text retrieval. IEEE Trans. on Knowledge and Data Engineering, 7(3):423–435, June 1995.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Subhash Bhalla

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Furuse, K., Asada, K., Iizawa, A. (1995). Implementation and performance evaluation of compressed bit-sliced signature files. In: Bhalla, S. (eds) Information Systems and Data Management. CISMOD 1995. Lecture Notes in Computer Science, vol 1006. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60584-3_30

Download citation

  • DOI: https://doi.org/10.1007/3-540-60584-3_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60584-3

  • Online ISBN: 978-3-540-47799-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics