Rectangular decomposition of signature file: Design issues and performance evaluation

  • Khedija Arour
  • Ali Jaoua
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1460)


Signature file acts as a filter to eliminate the unqualified data items for an information request. The contribution of this paper is two-fold. First, we propose a methodology for structured database. The main idea of decomposition amounts to dividing the relations of database into subrelations called ’rectangle’. Owing to the reduction of storage overhead, rectangular decomposition has a direct benefit in a reduction of false drop probability. Second, we extend the use of rectangular decomposition to partitionning signature file called Super-Rectangular Organisation SRO. The choice of the criteria to cluster signatures is based upon the relationship between the associated objects. Our main concern is to study the performance of this method in terms of this ability to reduce the search space and false drop probability. We also perform simulation experiments by comparing several methods like S-tree and Quick filter. The results show that the SRO improves performance significantly in term of retrieval time and false drop probability.

Key words

Access method Signature file Clustering Rectangular decomposition Rectangle Superimposed coding Performance analysis Information retrieval 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    K. Arout and A. Jaoua. Signature Extraction Method in Rectangular Database. Information Sciences, 87(1–3):67–78, November 1995.Google Scholar
  2. 2.
    F. Can. Incremental Clustering for Dynamic Information Processing. ACM Transactions on Information Systems, 11(2):143–164, April 1993.CrossRefMathSciNetGoogle Scholar
  3. 3.
    W.W. Chang and H.j. Schek. A Signature Access Method for the Starburst Database System. In Proceedings of the Fifteenth International Conference on Very Large Database. Amsterdam, pages 145–153, August 1989.Google Scholar
  4. 4.
    U. Deppisch. S-tree: A dynamic balansed signature index for office retieval. In Proceedings of the 1986 ACM Conference on Research and Development in Information Retrieval, Pisa, Italy, pages 77–87, September 1986.Google Scholar
  5. 5.
    C. Faloutsos. Signature Files: An Integrated Access Method for Text and Attributes Suitable for Optical Disk Storage. BIT, pages 736–754, 1988.Google Scholar
  6. 6.
    M.M. Gammoudi. Méthode de décomposition Rectangulaire d'une Relation Binaire: une Base Formelle et UNiforme pour la Génération Automatique des Thesaurus et la Recherche Documentaire. Doctorat es-sciences, spécialité informatique, Université de Nice-Sophia Antipolis, Septembre 1993.Google Scholar
  7. 7.
    R. Kcherif and A. Jaoua. Rectangular Decomposition Heuristics for Large Databases. In Joint Conference on Information Sciences, October 1995.Google Scholar
  8. 8.
    D.L. Lee, Y.M. Kim, and G. Patel. Efficient Signature File Methods For Text Retrieval. IEEE Transactions On Knowledge and Data Engineering, 7(3):423–435, June 1995.CrossRefGoogle Scholar
  9. 9.
    F. Rabitti and P. Savino. Image Query Processing on Multilevel Signatures. In Proceedings of the ACM SIGIR'90, International Conference, Chicago, Information Retrieval Brussels, pages 305–314, September 1991.Google Scholar
  10. 10.
    K. Ramamohanorao, R. Sacks-Davis, and A. Kent. A Signature File Scheme Based on Multiple organizations for Indexing Very Large Database. Information Sciences, 41(7):508–534, 1990.CrossRefGoogle Scholar
  11. 11.
    C.S. Roberts. Partial-Match REtrieval via the Method of Superimposed Codes. In Proceedings of the IEEE, volume 67, pages 1624–1642, December 1979.CrossRefGoogle Scholar
  12. 12.
    R. Sacks-Davis, A. Kent, and K. Ramamohanorao. Multikey Access Methods Based on Superimposed Coding Techniques. ACM Transactions on Database Systems, 12(4):655–696, December 1987.CrossRefGoogle Scholar
  13. 13.
    T. Zezula and F. Rabitti. Dynamic Partitionning of Signature Files. ACM Transactions on Information Systems, 9(4):336–369, October 1991.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Khedija Arour
    • 1
  • Ali Jaoua
    • 2
  1. 1.Institut Préparatoire aux Etudes d'Ingénieur de MateurTunisie
  2. 2.Faculté des Sciences de TunisDépt. des Sciences de l'InformatiqueCampus UniversitaireTunisTunisie

Personalised recommendations