Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2007, Vol. 8 Issue (4): 529-537    DOI: 10.1631/jzus.2007.A0529
Information & Computer Science     
Monitoring nearest neighbor queries with cache strategies
PAN Peng, LU Yan-sheng
College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  The problem of continuously monitoring multiple K-nearest neighbor (K-NN) queries with dynamic object and query dataset is valuable for many location-based applications. A practical method is to partition the data space into grid cells, with both object and query table being indexed by this grid structure, while solving the problem by periodically joining cells of objects with queries having their influence regions intersecting the cells. In the worst case, all cells of objects will be accessed once. Object and query cache strategies are proposed to further reduce the I/O cost. With object cache strategy, queries remaining static in current processing cycle seldom need I/O cost, they can be returned quickly. The main I/O cost comes from moving queries, the query cache strategy is used to restrict their search-regions, which uses current results of queries in the main memory buffer. The queries can share not only the accessing of object pages, but also their influence regions. Theoretical analysis of the expected I/O cost is presented, with the I/O cost being about 40% that of the SEA-CNN method in the experiment results.

Key wordsK-nearest neighbors (K-NNs)      Continuous query      Object cache      Query cache     
Received: 13 October 2006     
CLC:  TP311  
Cite this article:

PAN Peng, LU Yan-sheng. Monitoring nearest neighbor queries with cache strategies. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 529-537.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2007.A0529     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2007/V8/I4/529

[1] Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG. Certificateless key-insulated signature without random oracles[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1790-1800.
[2] Jin-hua JIANG, Ke CHEN, Xiao-yan LI, Gang CHEN, Li-dan SHOU. Efficient processing of ordered XML twig pattern matching based on extended Dewey[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1769-1783.
[3] Ying XU, Chang-fu ZONG, Hsiao-hsiang NA, Lei LIU. Investigations on control algorithm of steady-state cornering and control strategy for dynamical correction in a steer-by-wire system[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(6): 900-908.
[4] Peng HUANG, Jie ZHU. Predicting the fault-proneness of class hierarchy in object-oriented software using a layered kernel[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(10): 1390-1397.
[5] Qiong WEI, Yan-sheng LU, Lei ZOU. ε-inclusion: privacy preserving re-publication of dynamic datasets[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1124-1133.
[6] Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG. Bluetooth-based authentication system for ambient intelligence[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 770-775.
[7] Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN. Non-interactive identity-based threshold signature scheme without random oracles[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 727-736.
[8] Yi-jun BEI, Gang CHEN, Jin-xiang DONG, Ke CHEN. Bottom-up mining of XML query patterns to improve XML querying[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 744-757.
[9] FAROOQ M., WANG Dao-bo. Implementation of a new PC based controller for a PUMA robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(12): 1962-1970.
[10] LIANG Jun-jie, FENG Yu-cai. Indexing the bit-code and distance for fast KNN search in high-dimensional spaces[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(6): 857-863.
[11] HUANG Chuan-dong, JIANG Fan. Timing issues in distributed testing[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 522-528.
[12] HU Tian-lei, CHEN Gang, LI Xiao-yan, DONG Jin-xiang. Automatic relational database compression scheme design based on swarm evolution[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 4-.
[13] LIANG Hai-hua, ZHU Miao-liang. Applying the model driven generative domain engineering method to develop self-organizing architectural solutions for mobile robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 5-.
[14] HU Hua, ZHANG Yang. A framework for Internet service evolution based on active object[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 6-.
[15] WANG Mei-yuan, LU Yao-bin, ZHANG Jin-long. Software outsourcing risk management: establishing outsourcee evaluation item systems[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6): 1092-1098.