Concurrent In-Memory OLAP Query Optimization Techniques
1 (Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), Ministry of Education, Beijing 100872)
2 (School of Information, Renmin University of China, Beijing 100872)
3 (National Survey Research Center (Renmin University of China), Beijing 100872)
4 (National Satellite Meteorological Center, China Meteorological Administration, Beijing 100081)
More Information
Published Date:
November 30, 2016
Abstract
Recent researches not only focused on query-at-a-time query optimizations but also focused on group-at-a-time query optimizations due to the multicore hardware architecture support and highly concurrent workload requirements. By grouping concurrent queries into shared workload, some high latency operations, e.g., disk I/O, cache line access, can be shared for multiple queries. The existing approaches commonly lie in sharing query operators such as scan, join or predicate processing, and try to generate an optimized global executing plan for all the queries. For complex analytical workloads, how to generate an optimized shared execution plan is a challenging issue. In this paper, we present a template OLAP execution plan for widely adopted star schema to simplify execution plan for maximizing operator utilization. Firstly, we present a surrogate key oriented join index to transform traditional key probing based join operation to array index referencing (AIR) lookup to make join CPU efficient and support a lazy aggregation. Secondly, the predicate processing of concurrent queries is simplified as cache line conscious predicate vector to maximize concurrent predicate processing within single cache line access. Finally, we evaluate the concurrent template OLAP (on-line analytical processing) processing with multicore parallel implementation under the star schema benchmark(SSB), and the results prove that the shared scan and predicate processing can double the concurrent OLAP query performance.
Related Articles
[1] Pan Jianwen, Cui Zhanqi, Lin Gaoyi, Chen Xiang, Zheng Liwei. A Review of Static Detection Methods for Android Malicious Application [J]. Journal of Computer Research and Development, 2023, 60(8): 1875-1894. DOI: 10.7544/issn1000-1239.202220297
[2] Yang Yi, Li Ying, Chen Kai. Vulnerability Detection Methods Based on Natural Language Processing [J]. Journal of Computer Research and Development, 2022, 59(12): 2649-2666. DOI: 10.7544/issn1000-1239.20210627
[3] Guo Yingjie, Liu Xiaoyan, Wu Chenxi, Guo Maozu, Li Ao. U-Statistics and Ensemble Learning Based Method for Gene-Gene Interaction Detection [J]. Journal of Computer Research and Development, 2018, 55(8): 1683-1693. DOI: 10.7544/issn1000-1239.2018.20180365
[4] Zhang Hu, Tan Hongye, Qian Yuhua, Li Ru, Chen Qian. Chinese Text Deception Detection Based on Ensemble Learning [J]. Journal of Computer Research and Development, 2015, 52(5): 1005-1013. DOI: 10.7544/issn1000-1239.2015.20131552
[5] Zhou Quanqiang and Zhang Fuzhi. Ensemble Approach for Detecting User Profile Attacks Based on Bionic Pattern Recognition [J]. Journal of Computer Research and Development, 2014, 51(4): 789-801.
[6] Zhao Yunshan, Gong Yunzhan, Zhou Ao, Wang Qian, and Zhou Hongbo. False Positive Elimination in Static Defect Detection [J]. Journal of Computer Research and Development, 2012, 49(9): 1822-1831.
[7] Wang Yawen, Yao Xinhong, Gong Yunzhan, Yang Zhaohong. A Method of Buffer Overflow Detection Based on Static Code Analysis [J]. Journal of Computer Research and Development, 2012, 49(4): 839-845.
[8] Huo Wei, Yu Hongtao, Feng Xiaobing, and Zhang Zhaoqing. Static Race Detection of Interrupt-Driven Programs [J]. Journal of Computer Research and Development, 2011, 48(12): 2290-2299.
[9] Wang Zhaofei and Huang Chun. Static Detection of Deadlocks in OpenMP Fortran Programs [J]. Journal of Computer Research and Development, 2007, 44(3).
[10] Wu Ping, Chen Yiyun, Zhang Jian. Static Data-Race Detection for Multithread Programs [J]. Journal of Computer Research and Development, 2006, 43(2): 329-335.
Cited by
Periodical cited type(29)
1.
丁森阳,徐向华. 基于字段信息和覆盖率反馈的协议模糊测试方法. 软件工程. 2025(02): 56-60+66 .
2.
唐成华,蔡维嘉,杨萌萌,强保华. CBFuzzer:基于执行上下文导向及保护突破的程序缺陷模糊检测. 计算机研究与发展. 2025(03): 790-807 .
本站查看
3.
陆力瑜,刘媛,洪超,曹扬,莫蓓蓓,匡晓云,杨祎巍. 基于影响性导向的模糊测试种子筛选方法. 网络安全技术与应用. 2024(02): 44-46 .
4.
侍言,羌卫中,邹德清,金海. 进化内核模糊测试研究综述. 网络与信息安全学报. 2024(01): 1-21 .
5.
王明义,甘水滔,王晓锋,刘渊. 基于种子智能生成的内核模糊测试模型. 信息安全学报. 2024(03): 124-137 .
6.
李志博,李清宝,兰明敬. 基于ART优化选择策略的遗传算法生成测试数据方法. 计算机科学. 2024(06): 95-103 .
7.
崔展齐,张家铭,郑丽伟,陈翔. 覆盖率制导的灰盒模糊测试研究综述. 计算机学报. 2024(07): 1665-1696 .
8.
王琴应,许嘉诚,李宇薇,潘祖烈,张玉清,张超,纪守领. 智能模糊测试综述:问题探索和方法分类. 计算机学报. 2024(09): 2059-2083 .
9.
许爱东,徐培明,尚进,孙钦东. 基于强化学习多算法组合模型的智能化模糊测试技术. 计算机工程与应用. 2024(20): 284-292 .
10.
张翔,王峰,李兴华,查娟娟,叶家敏. 基于包序列变异和反馈引导的电力通信协议模糊测试方法. 宁夏电力. 2024(05): 70-75 .
11.
刘羿希,何俊,吴波,刘丙童,李子玉. DevSecOps中软件安全性测试技术综述. 计算机应用. 2024(11): 3470-3478 .
12.
李泽源,尹中旭,宗国笑,桑海涯. 基于多目标支配分析和路径动态修剪优化的定向模糊测试技术. 计算机应用研究. 2024(11): 3455-3463 .
13.
纪守领,王琴应,陈安莹,赵彬彬,叶童,张旭鸿,吴敬征,李昀,尹建伟,武延军. 开源软件供应链安全研究综述. 软件学报. 2023(03): 1330-1364 .
14.
孙力立 ,张培华 ,武成岗 ,王喆 . JavaScript引擎JIT代码的类型混淆缺陷检测器. 高技术通讯. 2023(03): 251-260 .
15.
白英民,师智斌,信文阁,窦建民,张舒娟,王子建. 基于词嵌入与Shapelet时序特征的智能合约漏洞检测方法研究. 中北大学学报(自然科学版). 2023(04): 381-387 .
16.
樊志强,王洪宇,刘日昇. 命令行接口模糊测试漏洞挖掘研究及应用. 网络安全与数据治理. 2023(07): 61-66+78 .
17.
王鹃,张冲,龚家新,李俊娥. 基于机器学习的模糊测试研究综述. 信息网络安全. 2023(08): 1-16 .
18.
李航宇,方浩然,曲彦文,郭帆. ADFuzz:使用异常检测筛选低频路径高效模糊测试. 计算机研究与发展. 2023(08): 1912-1924 .
本站查看
19.
刘博洋,刘潮,任艺琳,满芮,苗晗. 基于模糊测试工控协议漏洞挖掘技术研究. 科技风. 2023(24): 78-80 .
20.
白海波. 人工智能技术在模糊测试中的应用. 数字技术与应用. 2023(08): 16-18 .
21.
张颖君,周赓,程亮,孙晓山,张阳. 基于双重覆盖信息协同的协议模糊测试. 计算机系统应用. 2023(09): 32-42 .
22.
王宇,黄松,曲豫宾. 面向深度学习的模糊测试研究进展. 安庆师范大学学报(自然科学版). 2023(03): 66-73 .
23.
陈锦山,余斯航,祁琦,孙鑫,安珂欣,李俊娥. 针对VxWorks电力工控终端的模糊测试方法. 电力信息与通信技术. 2023(09): 15-22 .
24.
郑鹏,沙乐天. 基于混合分析的Java反序列化漏洞检测方法. 计算机工程. 2023(12): 136-145 .
25.
王雨绚,张之江,姚旭寅,李伟杰,杨融. 机载网络安保测试方法研究. 工业控制计算机. 2022(03): 95-97 .
26.
刘林彬,苗泉强,李俊娥. 基于模糊测试的GOOSE协议解析漏洞挖掘方法. 中国电力. 2022(04): 33-43 .
27.
程亮,王化磊,张阳,孙晓山. 基于聚类和新覆盖信息的模糊测试改进. 计算机系统应用. 2022(09): 192-200 .
28.
王朝晖,殷哲,刘娟. 软件供应链开源组件安全风险评估. 电子技术与软件工程. 2022(22): 80-84 .
29.
张琦,马莺姿. 模糊测试器AFL种子变异策略优化研究. 现代信息科技. 2021(24): 142-145 .
Other cited types(81)