Paper
5 August 2009 Detecting data anomalies methods in distributed systems
Author Affiliations +
Proceedings Volume 7502, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2009; 75022E (2009) https://doi.org/10.1117/12.838241
Event: Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2009, 2009, Wilga, Poland
Abstract
Distributed systems became most popular systems in big companies. Nowadays many telecommunications companies want to hold large volumes of data about all customers. Obviously, those data cannot be stored in single database because of many technical difficulties, such as data access efficiency, security reasons, etc. On the other hand there is no need to hold all data in one place, because companies already have dedicated systems to perform specific tasks. In the distributed systems there is a redundancy of data and each system holds only interesting data in appropriate form. Data updated in one system should be also updated in the rest of systems, which hold that data. There are technical problems to update those data in all systems in transactional way. This article is about data anomalies in distributed systems. Avail data anomalies detection methods are shown. Furthermore, a new initial concept of new data anomalies detection methods is described on the last section.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lukasz Mosiej "Detecting data anomalies methods in distributed systems", Proc. SPIE 7502, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2009, 75022E (5 August 2009); https://doi.org/10.1117/12.838241
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Distributed computing

Telecommunications

Databases

Data mining

Computing systems

Computer security

Data communications

Back to Top