Preview

Stratified B-Trees and Versioned Dictionaries

Best Essays
Open Document
Open Document
4093 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Stratified B-Trees and Versioned Dictionaries
Stratified B-trees and Versioned Dictionaries.
Andy Twigg, Andrew Byde, Grzegorz Miło´s, Tim Moreton, John Wilkesy and Tom Wilkie
Acunu, yGoogle firstname@acunu.com Abstract
External-memory versioned dictionaries are fundamental to file systems, databases and many other algorithms.
The ubiquitous data structure is the copy-onwrite
(CoW) B-tree. Unfortunately, it doesn’t inherit the
B-tree’s optimality properties; it has poor space utilization, cannot offer fast updates, and relies on random IO to scale. We describe the ‘stratified B-tree’, which is the first versioned dictionary offering fast updates and an optimal tradeoff between space, query and update costs.
1 Introduction
The (external-memory) dictionary is at the heart of any file system or database, and many other algorithms. A dictionary stores a mapping from keys to values. A versioned dictionary is a dictionary with an associated version tree, supporting the following operations:
 update(k,v,x): associate value x to key k in leaf version v;
 range query(k1,k2,v): return all keys (and values) in range [k1,k2] in version v;
 clone(v): return a new child of version v that inherits all its keys and values.
Note that only leaf versions can be modified. If clone only works on leaf versions, we say the structure is partially-versioned; otherwise it is fully-versioned.
2 Related work
The B-tree was presented in 1972 [1], and it survives because it has many desirable properties; in particular, it uses optimal space, and offers point queries in optimal
O(logB N) IOs1. More details can be found in [7].
1We use the standard notation B to denote the block size, andN the total number of elements inserted. For the analysis, we assume entries
(including pointers) are of equal size, so B is the number of entries per block. A versioned B-tree is of great interest to storage and file systems. In 1986, Driscoll et al. [8] presented the ‘path-copying’ technique to make



References: 1(3):173–189, 1972. 5(4):264–275, 1996. New York, NY, USA, 2007. ACM. [4] Jeff Bonwick and Matt Ahrens. The zettabyte file system, 2008. In USENIX Annual Technical Conference, pages 43–60, 1992. McGraw-Hill Higher Education, 2nd edition, 2001. In STOC ’86, pages 109–121, New York, NY, USA, 1986 USA, 1999. IEEE Computer Society. [11] Dave Hitz and James Lau. File system design for an nfs file server appliance, 1994. SIGMOD Rec., 20(2):426–435, 1991. Berkeley, CA, USA, 2003. USENIX Association.

You May Also Find These Documents Helpful

  • Good Essays

    Cse 373 Final Note

    • 955 Words
    • 4 Pages

    An ordered or sorted binary tree, is a node based binary tree data structure that has the following properties:…

    • 955 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    employees who will use the new database some extensive seminars, or other form of training to ensure that users have the knowledge on how the system will work. This will decrease redundancy and decrease data entry errors. I look forward to hearing from you regarding your thoughts, and concerns, with the database.…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Analysis Of 'E-Structors'

    • 914 Words
    • 4 Pages

    The video starts by introducing the e-waste recycling company “E-Structors” and its CEO, Julie Keough. She then goes on to explain how the company deconstructs dysfunctional electronics and extracts the minerals (gold, silver, copper, and palladium) within.…

    • 914 Words
    • 4 Pages
    Good Essays
  • Good Essays

    By evaluating the duality of illustrations as both mechanisms for pictorial representation and the act of narrative clarification, the images in Shel Silverstein’s picture book The Giving Tree (1964) subsequently solidify as the dominant mode for communicating the text’s overall themes to the reader. In presenting the pattern of action of personification, and the recurring images of isolation and sacrifice, Silverstein’s illustrations actively portray one such theme of the destabilizing psychological and physiological effects of rape on the female body. As such, these trends ultimately elevate the overall meaning of the work by inherently presenting readers with a socio-political consideration of the destructive consequences of male desire…

    • 123 Words
    • 1 Page
    Good Essays
  • Good Essays

    In a world often controlled by the realm of computational thinking and a life consumed by math and science classes, creative thought oftens appears to be mitigated. It is the fundamental nature of American education to not only teach the same content of each student, but to teach the same techniques with which to approach such truths. It is no fault of the teacher or the administrator, but is simply an unfortunate fact that cannot be avoided when attempting to simultaneously teach at least two dozen students. As a result of the public mass education system, individual thought is often suppressed in place of a well defined (and legally determined) academic curriculum. While the student gains knowledge and skills necessary for future success,…

    • 1083 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    If a primary key has been identified for the data, then the data is considered to be in first normal form (1NF).…

    • 3348 Words
    • 28 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Structure

    • 328 Words
    • 2 Pages

    How do you create an instruction that steps through an array, performing an operation on each item?…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Structure

    • 785 Words
    • 4 Pages

    2. Write a test program that keeps the list of the following fruit items called fruitQ in the queue in the following order: Apple, Orange, Grapes, Cherry. Perform the following operations…

    • 785 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    REVIEW QUESTIONS: Page 230 1) What is IT infrastructure and what are its components?  Define IT infrastructure from both a technology and a service perspective. Technical views – It is defined as shared technology resources which provide the platform for the company’s’ specific information system applications.…

    • 2518 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    NoSQL

    • 262 Words
    • 1 Page

    NoSQL (Not Only SQL) can be a great asset when it pertains to dealing with large amounts of data and its ability to be able to provide a better scalability and availability than the traditional RDBMS can make it a plus. But the down side of the perks that NoSQL provide may not make it the ultimate choice for many businesses. NoSQL ability to deliver faster access to data and easily is also an advantage for data storage. But due to its infrastructure of being nontraditional it raises concerns. Unlike most SQL systems NoSQL is not formally structured as its counterparts simply meaning it does not store data in an organized plan such as tables and rows. This makes it easier to store data more easily with multiple servers with an improved scalability. Because NoSQL lack of being structured in a formatted scheme it also lack confidentiality and integrity and the column or the rows cannot be segregated which may pose a challenge with user privileged access. Also, due to its scheme it lacks the capability of producing real time operations.…

    • 262 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Data Warehousing

    • 331 Words
    • 2 Pages

    Bill Inmon advocates a top-down development approach that adapts traditional relational database tools to the development needs of an enterprise wide data warehouse. From this enterprise wide data store, individual departmental databases are developed to serve most decision support needs.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    More people today are using the internet as their preferred source of information. Searching in databases and on the internet can be enhanced by the use of Boolean operators. Even if most people are capable of using the internet without knowledge of Boolean operators, this essay brings out their usefulness. This essay therefore attempts to support the assertion that Boolean operators are key in searching for information in databases as well as the internet. Working definitions given in this paper are Boolean operators, information search, database and the internet. Following is the history of Boolean operators; how they are used and their importance in searching for information with a conclusion based on their relevance to today’s dynamic search systems.…

    • 3084 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    data structures

    • 1321 Words
    • 6 Pages

    So far, to find something in a tree, or in a list, we have searched. However, there is another technique called hashing. Assume we are looking for some element e in a set S, where S may be implemented as a vector. We apply some function to e, hash (e), and this delivers the position of e in S, and we can then go directly to that location to get e or information on e. For example, e might be the key to a record, such as someone's name, and we wish to extract details/info on that person. e might be a telephone number and we want to know address, or e might be address and we want telephone number.…

    • 1321 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The Deep Web Outline

    • 514 Words
    • 3 Pages

    the deep web contains a lot of strange and hidden activity, and could easily be accesed through the use of programs. Hidden information, hactivism forums, hitman contracts, black markets, alljust a few clicks away. it isn’t illegal to access the deep web, so why not try it, just to check it out?…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Semantic Reranking

    • 3055 Words
    • 13 Pages

    Department of Computer Sciences UFSCar - Federal University of São Carlos Rod. Washington Luís, Km 235 Caixa Postal 676 13565-905 / São Carlos – SP – Brazil Phone/Fax:(55 16) 260-8232 Abstract…

    • 3055 Words
    • 13 Pages
    Powerful Essays

Related Topics