{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:47:20Z","timestamp":1764402440386,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2009,1]]},"abstract":"<jats:p>We explore how to manage database workloads that contain a mixture of OLTP-like queries that run for milliseconds as well as business intelligence queries and maintenance tasks that last for hours. As data warehouses grow in size to petabytes and complex analytic queries play a greater role in day-to-day business operations, factors such as inaccurate cardinality estimates, data skew, and resource contention all make it notoriously difficult to predict how such queries will behave before they start executing. However, traditional workload management assumes that accurate expectations for the resource requirements and performance characteristics of a workload are available at compile-time, and relies on such information in order to make critical workload management decisions. In this paper, we describe our approach to dealing with inaccurate predictions. First, we evaluate the ability of workload management algorithms to handle workloads that include unexpectedly long-running queries. Second, we describe a new and more accurate method for predicting the resource usage of queries before runtime. We have carried out an extensive set of experiments, and report on a few of our results.<\/jats:p>","DOI":"10.1145\/1496909.1496927","type":"journal-article","created":{"date-parts":[[2009,1,29]],"date-time":"2009-01-29T13:48:36Z","timestamp":1233236916000},"page":"92-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Managing operational business intelligence workloads"],"prefix":"10.1145","volume":"43","author":[{"given":"Umeshwar","family":"Dayal","sequence":"first","affiliation":[{"name":"HPL Hewlett-Packard Laboratories, Palo Alto, CA"}]},{"given":"Harumi","family":"Kuno","sequence":"additional","affiliation":[{"name":"HPL Hewlett-Packard Laboratories, Palo Alto, CA"}]},{"given":"Janet L.","family":"Wiener","sequence":"additional","affiliation":[{"name":"HPL Hewlett-Packard Laboratories, Palo Alto, CA"}]},{"given":"Kevin","family":"Wilkinson","sequence":"additional","affiliation":[{"name":"HPL Hewlett-Packard Laboratories, Palo Alto, CA"}]},{"given":"Archana","family":"Ganapathi","sequence":"additional","affiliation":[{"name":"UCB UC Berkeley, Berkeley, CA"}]},{"given":"Stefan","family":"Krompass","sequence":"additional","affiliation":[{"name":"TUM Technische Universit\u00e4t M\u00fcnchen,, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,1]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/362883.362920"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244303768966085"},{"key":"e_1_2_1_3_1","volume-title":"Automated Diagnosis and Control of DBMS Resources. In EDBT PhD. Workshop","author":"Benoit D. G.","year":"2000","unstructured":"D. G. Benoit . Automated Diagnosis and Control of DBMS Resources. In EDBT PhD. Workshop , 2000 . D. G. Benoit. Automated Diagnosis and Control of DBMS Resources. In EDBT PhD. Workshop, 2000."},{"key":"e_1_2_1_4_1","first-page":"282","volume-title":"ICDCS","author":"Carey M. J.","year":"1985","unstructured":"M. J. Carey , M. Livny , and H. Lu . Dynamic Task Allocation In A Distributed Database System . In ICDCS , pages 282 -- 291 , 1985 . M. J. Carey, M. Livny, and H. Lu. Dynamic Task Allocation In A Distributed Database System. In ICDCS, pages 282--291, 1985."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066223"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007659"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223845"},{"key":"e_1_2_1_8_1","volume-title":"How Input Data Sets Change Program Behaviour. In 5th Workshop on Computer Architecture Evaluation Using Commercial Workloads","author":"Eeckhout L.","year":"2002","unstructured":"L. Eeckhout , H. Vandierendonck , and K. D. Bosschere . How Input Data Sets Change Program Behaviour. In 5th Workshop on Computer Architecture Evaluation Using Commercial Workloads , 2002 . L. Eeckhout, H. Vandierendonck, and K. D. Bosschere. How Input Data Sets Change Program Behaviour. In 5th Workshop on Computer Architecture Evaluation Using Commercial Workloads, 2002."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/584792.584898"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.130"},{"key":"e_1_2_1_11_1","volume-title":"December","author":"Gillin P.","year":"2007","unstructured":"P. Gillin . BI @ the Speed of Business . Computer World Technology , December 2007 . P. Gillin. BI @ the Speed of Business. Computer World Technology, December 2007."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2008.12"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/279358.279364"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11948148_18"},{"key":"e_1_2_1_15_1","volume-title":"Proc. of the 33rd Intl. Conf. on Very Large Data Bases (VLDB)","author":"Krompass S.","year":"2007","unstructured":"S. Krompass , H. Kuno , U. Dayal , and A. Kemper . Dynamic Workload Management for Very Large Data Warehouses: Juggling Feathers and Bowling Balls . In Proc. of the 33rd Intl. Conf. on Very Large Data Bases (VLDB) , 2007 . S. Krompass, H. Kuno, U. Dayal, and A. Kemper. Dynamic Workload Management for Very Large Data Warehouses: Juggling Feathers and Bowling Balls. In Proc. of the 33rd Intl. Conf. on Very Large Data Bases (VLDB), 2007."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/279358.279367"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007658"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.79"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11687238_54"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564766"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/645919.672677"},{"key":"e_1_2_1_22_1","volume-title":"Data Center Workload Monitoring, Analysis, and Emulation","author":"Moore J.","year":"2005","unstructured":"J. Moore , J. Chase , K. Farkas , and P. Ranganathan . Data Center Workload Monitoring, Analysis, and Emulation , 2005 . J. Moore, J. Chase, K. Farkas, and P. Ranganathan. Data Center Workload Monitoring, Analysis, and Emulation, 2005."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.11"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/645927.672349"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(94)90004-3"},{"key":"e_1_2_1_26_1","volume-title":"DM Review Magazine","author":"White C.","year":"2005","unstructured":"C. White . The Next Generation of Business Intelligence : Operational BI . DM Review Magazine , May 2005 . C. White. The Next Generation of Business Intelligence: Operational BI. DM Review Magazine, May 2005."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2006.302739"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.129222"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1083592.1083628"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1496909.1496927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1496909.1496927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:31Z","timestamp":1750258051000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1496909.1496927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1145\/1496909.1496927"],"URL":"https:\/\/doi.org\/10.1145\/1496909.1496927","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2009,1]]},"assertion":[{"value":"2009-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}