Documente Academic
Documente Profesional
Documente Cultură
Me
Spits Warnars Harco Leslie Hendric, PhD (leslie.spitswarnas@budiluhur.ac.id) My
paper at
https://www.researchgate.net/profile/Harco_Leslie_Hendric_Spits_Warnars2/publicat
ions
1991-1995 Bachelor Degree (S.Kom)
from STMIK Budi Luhur (www.budiluhur.ac.id)
Information System development topic.
11/2/16
Networking SecurityFeb2014-SW
My research activity
Member of
IEEE (Institute of Electrical and Electronics Engineers)
Senior Member of
IACSIT (International Association of Computer Science and Information Technology)
Editorial board
Journal of Global Research in Computer Science (JGRCS) www.jgrcs.info
Reviewer
World Scientific and Engineering Academy and Society (WSEAS)
Behaviour & Information Technology
International Journal of Computer and Information Technology (IJCIT) http://www.ijcit.com
Journal of Computer Sciences and Applications(http://www.sciepub.com/journal/JCSA),
International Journal of Advanced Computer Science and Applications(IJACSA) (
http://thesai.org/Publications/IJACSA)
International Journal of Advanced Research in Artificial Intelligence(IJARAI) (
http://thesai.org/Publications/IJARAI)
International Journal of Computer and Information Technology (IJCIT) (
http://ijcit.com/editorial.php)
Programm committee
11/2/16
Networking SecurityFeb2014-SW
My research activity
Programm committee for International Conferences (2014)
Science and Information Conference (SAI) 2014, 27-29 August 2014, London, United Kingdom,
ICMASCTS'2014 (IEEE 2014 International Conference on Modeling, Analysis and Simulation of
Computer and Telecommunications Systems) ) in conjuction with WCCAIS2014 (World Congress
on Computer Applications and Information Systems), 17-19 January 2014, Hammamet, Tunisia,
ICISA'2014 (IEEE 2014 International Conference on Intelligent Systems and Applications) in
conjuction with WSWAN2014 (World Symposium on Web Applications and Networking), 22-24
March 2014, Hammamet, Tunisia,
ICFECSCE'2014 (IEEE 2014 International Conference on Frontiers in Education: Computer
Science and Computer Engineering) in conjuction with WCEECS2014 (World Congress on Elearning, Education and Computer Science), 13-15 June 2014, Hammamet, Tunisia,
ICCCI'2014 (IEEE 2014 5th International Conference on Computer and Computational
Intelligence), 6-7 December 2014, Paris, France,
Published papers
7 national Indonesian conferences, 13 Indonesian journals, 4 int journals, 9 Int conferences and
1 book.
(http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/w/Warnars:Spits.html) and Spits
Warnars H.L.H (
http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/h/H:Spits_Warnars_H=_L=.html), or list
at arxiv.org Cornell university library (http://arxiv.org/a/spitswarnars_h_1).
11/2/16
Networking SecurityFeb2014-SW
Group Projects
International Conference
Approved (IEEE, ACM, etc) , 80 score for 2014 & 75 score for previous years
Non Approved, 70 score for 2014 & 65 score for previous years
Is a File System a
DBMS?
Thought Experiment 1:
You and your project partner are editing the
same file.
You both save it at the same time.
Whose changes survive?
data modeling
languages and systems for querying data
Levels of Abstraction
Users
Physical schema
describes the files and
indexes used.
(sometimes called the
DB
View 2
View 3
Conceptual schema:
Students(sid: string, name: string,
Conceptual Schema
login: string, age: integer, gpa:real)
Courses(cid: string, cname:string,Physical Schema
credits:integer)
Enrolled(sid:string, cid:string,
grade:string)
DB
External Schema (View):
Course_info(cid:string,enrollment:integer)
Physical schema:
Relations stored as unordered files.
Index on first column of Students.
Data Independence
Applications insulated
from how data is
structured and stored.
Logical data
independence: Protection
from changes in logical
structure of data.
Physical data
independence:
Protection from changes
in physical structure of
data.
View 1
View 2
View 3
Conceptual Schema
Physical Schema
DB
Count
Having
distinct
Group(agg)
Join
Select
Join
Emp
System handles query
plan generation &
optimization; ensures
correct execution.
Proj
Emp
Emp
Asgn
Employees
Projects
Assignments
Concurrency Control
Concurrent execution of user programs: key to
good DBMS performance.
Disk accesses frequent, pretty slow
Keep the CPU working on several programs
concurrently.
Interleaving actions of different programs:
trouble!
e.g., account-transfer & print statement at same
time
DBMS ensures such problems dont arise.
Users/programmers can pretend they are using a
single-user system. (called Isolation)
Thank goodness! Dont have to program very, very
carefully.
These layers
must consider
concurrency
control and
recovery
Structure of a DBMS
A typical DBMS has a
layered architecture.
The figure does not
show the concurrency
control and recovery
components.
Each database
system has its own
variations.
Query Optimization
and Execution
Relational Operators
Files and Access Methods
Buffer Management
Disk Space Management
DB
Advantages of a DBMS
Data independence
Efficient data access
Data integrity & security
Data administration
Concurrent access, crash recovery
Reduced application development time
So why not use them always?
Expensive/complicated to set up & maintain
This cost & complexity must be offset by need
General-purpose, not suited for special-purpose tasks (e.g.
text search!)
Summary (part 1)
Summary, cont.
DBAs, DB developers the
bedrock of the information
economy