• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Jun, Zhang Peng, Guo Li, Zhou Xiaofei. An Adaptive Shared Filter Ordering Algorithm for Data Stream Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 961-968.
Citation: Li Jun, Zhang Peng, Guo Li, Zhou Xiaofei. An Adaptive Shared Filter Ordering Algorithm for Data Stream Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 961-968.

An Adaptive Shared Filter Ordering Algorithm for Data Stream Systems

More Information
  • Published Date: May 14, 2013
  • In multimedia stream filtering scenario, there usually exist many filtering queries that specify the filtering objectives and many filters that estimate the filtering queries. A filtering query may connect to several different filters and a filter may connect to several different filtering queries. An open problem in such a filtering scenario is how to order the filters in an optimal sequence so as to decrease the filtering cost. Existing methods are based on a greedy strategy which orders the filters according to three factors of the filters, i.e., the selectivity, popularity, and cost. Although all these methods reported good results, there are still some problems that havent been addressed yet. Firstly, the selectivity factor is set empirically, which can not adaptively adjust with stream passing by. Secondly, the relationships among the three factors are not considerably explored. Under these observations, in this paper, we propose an adaptive hierarchal ordering (AHO) algorithm which executes a two-stage ordering strategy. In the first ordering stage, AHO clusters all the filters according to their popularities and costs factors. In the second stage, for each cluster all the filters are then ordered according to their selectivity. Experiments on both synthetic and real life multimedia streams demonstrate that our AHO method outperforms other simple filtering methods.
  • Related Articles

    [1]Meng Yinfeng, Liang Jiye. Linear Regularized Functional Logistic Model[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626. DOI: 10.7544/issn1000-1239.2020.20200496
    [2]Geng Pu, Zhu Yuefei. A Code Encrypt Technique Based on Branch Condition Obfuscation[J]. Journal of Computer Research and Development, 2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368
    [3]Wang Rongquan, Ouyang Dantong, Wang Yiyuan, Liu Siguang, Zhang Liming. Solving Minimal Hitting Sets Method with SAT Based on DOEC Minimization[J]. Journal of Computer Research and Development, 2018, 55(6): 1273-1281. DOI: 10.7544/issn1000-1239.2018.20160809
    [4]Jiang Shujuan, Han Han, Shi Jiaojiao, Zhang Yanmei, Ju Xiaolin, Qian Junyan. Detecting Infeasible Paths Based on Branch Correlations Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 1072-1085. DOI: 10.7544/issn1000-1239.2016.20148031
    [5]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [6]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [7]Mao Chengying, Yu Xinxin, Xue Yunzhi. Algorithm Design and Empirical Analysis for Particle Swarm Optimization-Based Test Data Generation[J]. Journal of Computer Research and Development, 2014, 51(4): 824-837.
    [8]Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang. Study of Ahead Branch Prediction Architecture and Algorithm[J]. Journal of Computer Research and Development, 2013, 50(10): 2228-2238.
    [9]Zhou Lian, Wang Guojin. Piecewise Linear Approximation of Rational Triangular Surfaces[J]. Journal of Computer Research and Development, 2012, 49(5): 1116-1122.
    [10]Zhao Chuanshen, Sun Zhihui, and Zhang Jing. Frequent Subtree Mining Based on Projected Branch[J]. Journal of Computer Research and Development, 2006, 43(3): 456-462.

Catalog

    Article views (838) PDF downloads (519) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return