scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Patent
06 Apr 2000
TL;DR: In this article, a computer accessible system for electronically storing a model which communicates the physical attributes of a structure along with warranty, insurance and other information relative to that structure is presented.
Abstract: The present invention relates to a computer accessible system for electronically storing a model which communicates the physical attributes of a structure along with warranty, insurance and other information relative to that structure. The system of the present invention integrates physical information in a model which is displayed as a physical representation of the structure with other non-physical information. Selecting specific areas of the model provides access to data regarding physical or non-physical characteristics of that area of the structure and the contents thereof. Data relevant to warranties, insurance, maintenance or other information can be accessed by selecting portions of the model or indices attached or related to that portion. Equipment, appliances and other items within the structure may also be controlled by access through the computer model. Systems of the present invention allow multiple users to remotely access the information and model via a computer network, such as the Internet, in order to make informed decisions regarding the structure and its characteristics.

108 citations

Patent
21 Dec 2001
TL;DR: In this paper, the authors present a technology for supporting multiple data stores, which can be of a uniform type, or the various data stores can be different types (e.g., Lightweight Directory Access Protocol (LDAP), Structured Query Language (SQL), etc.).
Abstract: Technology is disclosed for supporting multiple data stores. The set of data stores can be of a uniform type, or the various data stores can be different types (e.g. Lightweight Directory Access Protocol (LDAP), Structured Query Language (SQL), etc.). One implementation of the disclosed technology is with an Identity System. Another implementation is with an integrated Identity System and Access System. Various embodiments of the present invention utilize different means to separate the business logic of a system from the data access logic so that different types of data stores can be used without changing the business logic.

108 citations

Proceedings Article
06 Dec 2004
TL;DR: A new distributed file system called BlueFS is built, which reduces file system energy usage by up to 55% and provides up to 3 times faster access to data replicated on portable storage.
Abstract: A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless networks such as 802.11 offer connectivity to small, mobile devices. Portable storage, such as mobile disks and USB keychains, let users carry several gigabytes of data in their pockets. Yet, at least three substantial barriers to pervasive data access remain. First, power-hungry network and storage devices tax the limited battery capacity of mobile computers. Second, the danger of viewing stale data or making inconsistent updates grows as objects are replicated across more computers and portable storage devices. Third, mobile data access performance can suffer due to variable storage access times caused by dynamic power management, mobility, and use of heterogeneous storage devices. To overcome these barriers, we have built a new distributed file system called BlueFS. Compared to the Coda file system, BlueFS reduces file system energy usage by up to 55% and provides up to 3 times faster access to data replicated on portable storage.

107 citations

Patent
08 Mar 2013
TL;DR: In this paper, software, firmware, and systems that migrate functionality of a source physical computing device to a destination virtual machine are described, and a non-production copy of data associated with a source PC device is created.
Abstract: Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination virtual machine. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination virtual machine is determined based at least in part on the configuration of the source physical computing device. The destination virtual machine is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device.

107 citations

Proceedings ArticleDOI
24 Sep 2014
TL;DR: This paper describes the intrinsic operations and mechanisms of an instantiation of NFN based on untyped Lambda expressions and Scala procedures and demonstrates through a series of proof-of-concept experiments how they extend the capabilities of an information centric network (CCN), for orchestrating and distributing data computations, and re-using cached results from previous computations.
Abstract: Named Function Networking (NFN) extends classic Information Centric Networking (ICN), such that in addition to resolving data access by name, it also supports the concept of function definition and application to data (or other functions) in the same resolution-by-name process. This empowers the network to select internally (optimal) places for fulfilling a potentially complex user expression. Forwarding optimization and routing policies become thereafter a basis of dynamic decisions for (re)-distributing computations, and retrieving results. In this paper we describe the intrinsic operations and mechanisms of an instantiation of NFN based on untyped Lambda expressions and Scala procedures. Then, we demonstrate through a series of proof-of-concept experiments how they extend the capabilities of an information centric network (CCN), for orchestrating and distributing data computations, and re-using cached results from previous computations. In the end we report and discuss the main observations stemming from these experiments and highlight important insights that can impact the architecting of ICN protocols that focus on named-data.

107 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816