원문정보
보안공학연구지원센터(IJDTA)
International Journal of Database Theory and Application
Vol.9 No.5
2016.05
pp.55-64
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Problem Definitions
3. Key Components of SDRT-MR Key Components of SDRT Key Components of SDRT Key Components of SDRT
3.1. Optimizing the Intermediate Results based on Hash Technology
3.2. Fast In-Memory Approach Based on Dynamic Incremental Hash Technique
4. The Framework of SDRT-MR
5. Experimental Evaluation
5.1. Real -Time Performance Analysis
5.2. Scalability Analysis
6. Conclusion
Acknowledgement
References
1. Introduction
2. Problem Definitions
3. Key Components of SDRT-MR Key Components of SDRT Key Components of SDRT Key Components of SDRT
3.1. Optimizing the Intermediate Results based on Hash Technology
3.2. Fast In-Memory Approach Based on Dynamic Incremental Hash Technique
4. The Framework of SDRT-MR
5. Experimental Evaluation
5.1. Real -Time Performance Analysis
5.2. Scalability Analysis
6. Conclusion
Acknowledgement
References
저자정보
참고문헌
자료제공 : 네이버학술정보
