cs345-streams-3

cs345-streams-3 - 1 Mining Data Streams The Stream Model...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 Mining Data Streams The Stream Model Sliding Windows Counting 1s 2 Data Management Versus Stream Management In a DBMS, input is under the control of the programmer. SQL INSERT commands or bulk loaders. Stream Management is important when the input rate is controlled externally. Example : Google queries. 3 The Stream Model Input tuples enter at a rapid rate, at one or more input ports. The system cannot store the entire stream accessibly. How do you make critical calculations about the stream using a limited amount of (secondary) memory? 4 Processor Limited Working Storage . . . 1, 5, 2, 7, 0, 9, 3 . . . a, r, v, t, y, h, b . . . 0, 0, 1, 0, 1, 1, 0 time Streams Entering Ad-Hoc Queries Output Archival Storage Standing Queries 5 Applications (1) Mining query streams. Google wants to know what queries are more frequent today than yesterday. Mining click streams. Yahoo wants to know which of its pages are getting an unusual number of hits in the past hour. 6 Applications (2) Sensors of all kinds need monitoring, especially when there are many sensors of the same type, feeding into a central controller. Telephone call records are summarized into customer bills. 7 Applications (3) IP packets can be monitored at a switch. Gather information for optimal routing. Detect denial-of-service attacks. 8 Sliding Windows A useful model of stream processing is that queries are about a window of length N the N most recent elements received....
View Full Document

Page1 / 27

cs345-streams-3 - 1 Mining Data Streams The Stream Model...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online