Adaptive indexing for relational keys

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Adaptive indexing for relational keys
# 1  
Old 02-07-2010
Adaptive indexing for relational keys

HPL-2010-23 Adaptive indexing for relational keys - Graefe, Goetz; Kuno, Harumi
Keyword(s): databases, indexes, storage systems, B-trees, adaptive merging, database cracking
Abstract: Adaptive indexing schemes such as database cracking and adaptive merging have been investigated to-date only in the context of range queries. These are typical for non-key columns in relational databases. For complete self-managing indexing, adaptive indexing must also apply to key columns. The pres ...
Full Report

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Relational operator

Hi guys , if a=12345678 i need to check that "a" less than 8 char greater than 8 char equal to 8 char contain only numeric. I done the above with seperate if condition to check and print the proper echo statement according to the result.i.e more than 8 char/lessthan etc.. can i able... (2 Replies)
Discussion started by: mohanalakshmi
2 Replies

2. Shell Programming and Scripting

indexing a file

hello guys, I have a file like this: input.dat Push-to-talk No Coonection IP support Support for IP telephony Yes Built-in SIP stack Yes Support via software Yes Microsoft Support for Microsoft Exchange Yes UMA (5 Replies)
Discussion started by: Johanni
5 Replies

3. Shell Programming and Scripting

Processing small database which is not relational

Hello, Decided to edit the whole post as nobody was replying, and it was pretty darn big as it was. So I have to write this script for my assignment, and I am new to scripting. The problem is we have to handle command line args, process an operations file which adds supermarket items to a database... (7 Replies)
Discussion started by: gcampton
7 Replies

4. UNIX for Advanced & Expert Users

Relational Join (Composite Key)

hi, i have file 1: ====== 0501000|X1 0502000|X2 0501231|X3 0981222|X4 0502000|X6 0503000|X7 0932322|X8 file 2: ======= 050 0501 0502 09 098 (1 Reply)
Discussion started by: magedfawzy
1 Replies

5. UNIX for Dummies Questions & Answers

arrow keys / special keys

how to use the arrow keys in shell scripting. is there any special synatax / command for this. i just want to use the arrow keys for navigation. replies appreciated raguram R (3 Replies)
Discussion started by: raguramtgr
3 Replies
Login or Register to Ask a Question
PSK-CRACK(1)						      General Commands Manual						      PSK-CRACK(1)

NAME
psk-crack - Crack IKE Aggressive Mode Pre-Shared Keys SYNOPSIS
psk-crack [options] <psk-parameters-file> <psk-parameters-file> is a file containing the parameters for the pre-shared key cracking process in the format generated by ike-scan with the --pskcrack (-P) option. This file can contain one or more entries. For multiple entries, each one must be on a separate line. The program can crack either MD5 or SHA1-based hashes. The type of hash is automatically determined from the length of the hash (16 bytes for MD5 or 20 bytes for SHA1). Each entry in the <psk-parameters-file> is handled separately, so it is possible to crack a mixture of MD5 and SHA1 hashes. psk-crack can also crack the proprietary hash format used by Nortel Contivity / VPN Router systems. When cracking Nortel format hashes, you need to specify the username of the hash that you are cracking with the --norteluser (-u) option. When cracking Nortel format hashes, you can only crack one hash at a time. By default, psk-crack will perform dictionary cracking using the default dictionary. The dictionary can be changed with the --dictionary (-d) option, or brute-force cracking can be selected with the --bruteforce (-B) option. DESCRIPTION
psk-crack attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option. psk-crack can operate in two different modes: 1) Dictionary cracking mode: this is the default mode in which psk-crack tries each candidate word from the dictionary file in turn until it finds a match, or all the words in the dictionary have been tried. 2) Brute-force cracking mode: in this mode, psk-crack tries all possible combinations of a specified character set up to a given length. OPTIONS
--help or -h Display this usage message and exit. --version or -V Display program version and exit. --verbose or -v Display verbose progress messages. --dictionary=<f> or -d <f> Set dictionary file to <f>. The default is /usr/local/share/ike-scan/psk-crack-dictionary. --norteluser=<u> or -u <u> Specify the username for Nortel Contivity cracking. This option is required when cracking pre-shared keys on Nortel Contivity / VPN Router systems. These systems use a proprietary method to calculate the hash that includes the username. This option is only needed when cracking Nortel format hashes, and should not be used for standard format hashes. --bruteforce=<n> or -B <n> Select bruteforce cracking up to <n> characters. --charset=<s> or -c <s> Set bruteforce character set to <s> Default is "0123456789abcdefghijklmnopqrstuvwxyz" AUTHOR
Roy Hills <Roy.Hills@nta-monitor.com> February 14, 2005 PSK-CRACK(1)