Reversible Numeric Composite Key (RNCK)

06/07/2023
by   Nicola Asuni, et al.
0

In database design, Composite Keys are used to uniquely identify records and prevent data duplication. However, they require more memory and storage space than single keys, and can make queries more CPU-intensive. Surrogate Keys are an alternative that can overcome some of these limitations, but they can also introduce new disadvantages. To address these challenges, a new type of key called a Reversible Numeric Composite Key (RNCK) has been developed. RNCK is a single number that encodes multiple data attributes, and can be decoded back to the original values. This makes it possible to achieve the benefits of both Composite Keys and Surrogate Keys, while overcoming some of their limitations. RNCK has been shown to improve query performance and reduce memory and storage requirements. It can be used in relational databases, large static datasets, and key-value caching systems. RNCK has been successfully used in production systems for several years.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/25/2022

A Dichotomy in Consistent Query Answering for Primary Keys and Unary Foreign Keys

Since 2005, significant progress has been made in the problem of Consist...
research
07/11/2021

Fairer Software Made Easier (using "Keys")

Can we simplify explanations for software analytics? Maybe. Recent resul...
research
03/12/2018

A Modular Design for Geo-Distributed Querying

Most distributed storage systems provide limited abilities for querying ...
research
06/07/2023

Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure (Full Version)

Key-value stores typically leave access control to the systems for which...
research
05/11/2017

ROCKER: A Refinement Operator for Key Discovery

The Linked Data principles provide a decentral approach for publishing s...
research
02/17/2020

Unique key Horn functions

Given a relational database, a key is a set of attributes such that a va...
research
05/31/2022

Discovery of Keys for Graphs [Extended Version]

Keys for graphs uses the topology and value constraints needed to unique...

Please sign up or login with your details

Forgot password? Click here to reset