Abstract. High-dimensional indexes do not work because of the often-cited
“curse of dimensionalit... more Abstract. High-dimensional indexes do not work because of the often-cited “curse of dimensionality.” However, users are usually interested in querying data over a relatively small subset of the entire attribute set at a time. A potential solution is to use lower dimensional indexes that accurately represent the user access patterns. To address these issues, in this paper we propose a parameterizable technique to recommend indexes based on index types. Keywords: Object Oriented, Database Model, High dimensional indexes, indexing.
Virtualization has been revolutionizing the IT world, enabling businesses to gain tremendous adva... more Virtualization has been revolutionizing the IT world, enabling businesses to gain tremendous advantages, such as cost reductions in infrastructure and utilities. Increased redundancy, business recovery improvements, and greater business scalability are also being realized. These benefits are driving virtualization technology into nearly every IT organization. Desktop computing is ubiquitous and represents a growing cost for IT. Virtual Desktop Infrastructure (VDI) has emerged as an effective solution to help enterprises overcome challenges associated with traditional desktop computing. VDI helps enterprises to deliver applications and information to the end users seamlessly while ensuring centralized deployment and maintenance of desktop infrastructure from the enterprise data centers. Updating operating systems and applications has become very time consuming and costly while securing access to data has become more complex. Virtual Desktop Infrastructure (VDI) offers a solution. VDI separates the desktop operating system and application configuration from the physical device. Instead of managing individual desktop devices in a distributed manner, the software stacks (operating system plus applications and configuration settings) are hosted in the data center using a master catalog of pre-built and tested configurations. Users are assigned to a particular standard configuration that supports their role. When they connect to the VDI environment, applications run on virtual servers with screen updates pushed over the network (campus LAN or WAN) to the user's display. Cloud computing is also on the rise, taking virtualization to the next level. The next logical step for today's corporate IT infrastructure is desktop virtualization, also known as Virtual Desktop Infrastructure (VDI). The idea is simply to provide standard desktops as virtual machines that are accessible by users through other devices, such as desktops, laptops, thin clients, mobile devices, tablets and smart phones. While there are obvious Total Cost of Ownership (TCO) advantages to virtualization for the server and storage areas, the main drivers for VDI are improved service to the user, reduced operational cost for the support organization, and increased security (data is kept within the data center and not stored on the device itself). Clearly, VDI has attractive advantages. VDI deployed over cloud infrastructure and delivered as "desktop as a service" makes the overall value proposition even more powerful. The combination of VDI and Cloud, also referred to as VDI on Cloud, is a scenario where VDI infrastructure is deployed centrally on a unified stack of cloud enabled platform (private cloud) [1].
Web mining can be broadly defined as discovery and analysis of useful information from the World ... more Web mining can be broadly defined as discovery and analysis of useful information from the World Wide Web. Based on the different emphasis and different ways to obtain information, web mining can be divided into two major parts: Web Contents Mining and Web Usage Mining. Web Contents Mining can be described as the automatic search and retrieval of information and resources available from millions of sites and on-line databases though search engines / web spiders. Web Usage Mining can be described as the discovery and analysis of user access patterns, through the mining of log files and associated data from a particular Web site. Data mining which is a new method in retrieving the high amount of information has been introduced. Data mining nowadays plays an important role in searching the Information on the web that includes a high variety data types. For reaching this goal, data mining techniques for automatic discovering and extracting the web based information has been used as web mining.
In this paper we describe an experimental system using java programming language which demonstrat... more In this paper we describe an experimental system using java programming language which demonstrates a variety of application level tradeoffs available to distributed NLP applications. In this paper, we proposed language identification system with N-grambased matching for document retrieval. By using a well known N-gram based algorithm for automatic language identification, we construct a system that dynamically adds language labels for whole documents or text fragments.
With the rapid development of computer and information technology in the last several decades, an... more With the rapid development of computer and information technology in the last several decades, an enormous amount of data in science and engineering has been and will continuously be generated in massive scale, either being stored in gigantic storage devices or flowing into and out of the system in the form of data streams. Moreover, such data has been made widely available, e.g., via the Internet. Such tremendous amount of data, in the order of tera-to peta-bytes, has fundamentally changed science and engineering, transforming many disciplines from data-poor to increasingly data-rich, and calling for new, data-intensive methods to conduct research in science and engineering.
High-dimensional indexes do not work because of the often-cited "curse of dimensionality." Howeve... more High-dimensional indexes do not work because of the often-cited "curse of dimensionality." However, users are usually interested in querying data over a relatively small subset of the entire attribute set at a time. A potential solution is to use lower dimensional indexes that accurately represent the user access patterns. To address these issues, in this paper we propose a parameterizable technique to recommend indexes based on index types.
Data has become the enabling technology for many of the recent innovations. "More data trumps sma... more Data has become the enabling technology for many of the recent innovations. "More data trumps smarter algorithms" has been the mantra behind this revolution in computing. Given the rate at which the data is produced, there is need for scalable solutions to extract information out of them. Allowing the data to be stored in the cloud and be accessed without geographical and scalability limitations will remove many bottlenecks in bringing data-oriented innovations. Current cloud architecture solves the issues of accessibility and scalability, but poses several new challenges such as automatic management of the service, pricing the data, and security of the data. This talk will include several techniques to address these challenges using automatic physical design, servicebased pricing, and cryptographic mechanisms. Data Information Knowledge Intelligence.
Cloud computing is current buzzword in the market. It is paradigm in which the resources can be l... more Cloud computing is current buzzword in the market. It is paradigm in which the resources can be leveraged on peruse basis thus reducing the cost and complexity of service providers. Cloud computing promises to cut operational and capital costs and more importantly let IT departments focus on strategic projects instead of keeping datacenters running. It is much more than simple internet. It is a construct that allows user to access applications that actually reside at location other than user's own computer or other Internet-connected devices. There are numerous benefits of this construct. For instance other company hosts user application. This implies that they handle cost of servers, they manage software updates and depending on the contract user pays less i.e. for the service only. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Infrastructure as a Service (IaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer will certainly affect the other delivery models, i.e., PaaS, and SaaS that are built upon IaaS layer. This paper presents an elaborated study of IaaS components' security and determines vulnerabilities and countermeasures. Service Level Agreement should be considered very much importance.
Abstract. High-dimensional indexes do not work because of the often-cited
“curse of dimensionalit... more Abstract. High-dimensional indexes do not work because of the often-cited “curse of dimensionality.” However, users are usually interested in querying data over a relatively small subset of the entire attribute set at a time. A potential solution is to use lower dimensional indexes that accurately represent the user access patterns. To address these issues, in this paper we propose a parameterizable technique to recommend indexes based on index types. Keywords: Object Oriented, Database Model, High dimensional indexes, indexing.
Virtualization has been revolutionizing the IT world, enabling businesses to gain tremendous adva... more Virtualization has been revolutionizing the IT world, enabling businesses to gain tremendous advantages, such as cost reductions in infrastructure and utilities. Increased redundancy, business recovery improvements, and greater business scalability are also being realized. These benefits are driving virtualization technology into nearly every IT organization. Desktop computing is ubiquitous and represents a growing cost for IT. Virtual Desktop Infrastructure (VDI) has emerged as an effective solution to help enterprises overcome challenges associated with traditional desktop computing. VDI helps enterprises to deliver applications and information to the end users seamlessly while ensuring centralized deployment and maintenance of desktop infrastructure from the enterprise data centers. Updating operating systems and applications has become very time consuming and costly while securing access to data has become more complex. Virtual Desktop Infrastructure (VDI) offers a solution. VDI separates the desktop operating system and application configuration from the physical device. Instead of managing individual desktop devices in a distributed manner, the software stacks (operating system plus applications and configuration settings) are hosted in the data center using a master catalog of pre-built and tested configurations. Users are assigned to a particular standard configuration that supports their role. When they connect to the VDI environment, applications run on virtual servers with screen updates pushed over the network (campus LAN or WAN) to the user's display. Cloud computing is also on the rise, taking virtualization to the next level. The next logical step for today's corporate IT infrastructure is desktop virtualization, also known as Virtual Desktop Infrastructure (VDI). The idea is simply to provide standard desktops as virtual machines that are accessible by users through other devices, such as desktops, laptops, thin clients, mobile devices, tablets and smart phones. While there are obvious Total Cost of Ownership (TCO) advantages to virtualization for the server and storage areas, the main drivers for VDI are improved service to the user, reduced operational cost for the support organization, and increased security (data is kept within the data center and not stored on the device itself). Clearly, VDI has attractive advantages. VDI deployed over cloud infrastructure and delivered as "desktop as a service" makes the overall value proposition even more powerful. The combination of VDI and Cloud, also referred to as VDI on Cloud, is a scenario where VDI infrastructure is deployed centrally on a unified stack of cloud enabled platform (private cloud) [1].
Web mining can be broadly defined as discovery and analysis of useful information from the World ... more Web mining can be broadly defined as discovery and analysis of useful information from the World Wide Web. Based on the different emphasis and different ways to obtain information, web mining can be divided into two major parts: Web Contents Mining and Web Usage Mining. Web Contents Mining can be described as the automatic search and retrieval of information and resources available from millions of sites and on-line databases though search engines / web spiders. Web Usage Mining can be described as the discovery and analysis of user access patterns, through the mining of log files and associated data from a particular Web site. Data mining which is a new method in retrieving the high amount of information has been introduced. Data mining nowadays plays an important role in searching the Information on the web that includes a high variety data types. For reaching this goal, data mining techniques for automatic discovering and extracting the web based information has been used as web mining.
In this paper we describe an experimental system using java programming language which demonstrat... more In this paper we describe an experimental system using java programming language which demonstrates a variety of application level tradeoffs available to distributed NLP applications. In this paper, we proposed language identification system with N-grambased matching for document retrieval. By using a well known N-gram based algorithm for automatic language identification, we construct a system that dynamically adds language labels for whole documents or text fragments.
With the rapid development of computer and information technology in the last several decades, an... more With the rapid development of computer and information technology in the last several decades, an enormous amount of data in science and engineering has been and will continuously be generated in massive scale, either being stored in gigantic storage devices or flowing into and out of the system in the form of data streams. Moreover, such data has been made widely available, e.g., via the Internet. Such tremendous amount of data, in the order of tera-to peta-bytes, has fundamentally changed science and engineering, transforming many disciplines from data-poor to increasingly data-rich, and calling for new, data-intensive methods to conduct research in science and engineering.
High-dimensional indexes do not work because of the often-cited "curse of dimensionality." Howeve... more High-dimensional indexes do not work because of the often-cited "curse of dimensionality." However, users are usually interested in querying data over a relatively small subset of the entire attribute set at a time. A potential solution is to use lower dimensional indexes that accurately represent the user access patterns. To address these issues, in this paper we propose a parameterizable technique to recommend indexes based on index types.
Data has become the enabling technology for many of the recent innovations. "More data trumps sma... more Data has become the enabling technology for many of the recent innovations. "More data trumps smarter algorithms" has been the mantra behind this revolution in computing. Given the rate at which the data is produced, there is need for scalable solutions to extract information out of them. Allowing the data to be stored in the cloud and be accessed without geographical and scalability limitations will remove many bottlenecks in bringing data-oriented innovations. Current cloud architecture solves the issues of accessibility and scalability, but poses several new challenges such as automatic management of the service, pricing the data, and security of the data. This talk will include several techniques to address these challenges using automatic physical design, servicebased pricing, and cryptographic mechanisms. Data Information Knowledge Intelligence.
Cloud computing is current buzzword in the market. It is paradigm in which the resources can be l... more Cloud computing is current buzzword in the market. It is paradigm in which the resources can be leveraged on peruse basis thus reducing the cost and complexity of service providers. Cloud computing promises to cut operational and capital costs and more importantly let IT departments focus on strategic projects instead of keeping datacenters running. It is much more than simple internet. It is a construct that allows user to access applications that actually reside at location other than user's own computer or other Internet-connected devices. There are numerous benefits of this construct. For instance other company hosts user application. This implies that they handle cost of servers, they manage software updates and depending on the contract user pays less i.e. for the service only. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Infrastructure as a Service (IaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer will certainly affect the other delivery models, i.e., PaaS, and SaaS that are built upon IaaS layer. This paper presents an elaborated study of IaaS components' security and determines vulnerabilities and countermeasures. Service Level Agreement should be considered very much importance.
Uploads
Papers by rajesh saturi
“curse of dimensionality.” However, users are usually interested in querying
data over a relatively small subset of the entire attribute set at a time. A
potential solution is to use lower dimensional indexes that accurately represent
the user access patterns. To address these issues, in this paper we propose a
parameterizable technique to recommend indexes based on index types.
Keywords: Object Oriented, Database Model, High dimensional indexes,
indexing.
“curse of dimensionality.” However, users are usually interested in querying
data over a relatively small subset of the entire attribute set at a time. A
potential solution is to use lower dimensional indexes that accurately represent
the user access patterns. To address these issues, in this paper we propose a
parameterizable technique to recommend indexes based on index types.
Keywords: Object Oriented, Database Model, High dimensional indexes,
indexing.