How Poor Is the “Poor Man’s Search Engine”?
The modern world generates huge amounts of documents each day. Text data is ubiquitous in the digital space. They can contain information about products in an online store, the opinions of a blog author, reportage in a newspaper or questions and advice from online forums. Most of this data is managed using DBMS - mainly relational ones. Thus, the more crucial it becomes to find the most efficient use of the available text search mechanisms. This work examines the basic word search methods in the two of the most popular open DBMS: PostgreSQL and MariaDB. The results of the empirical tests will serve as a starting point for discussion is the “Poor Man’s Search Engine” SQL antipattern still an antipattern?
- 2.Eessaar, E.: On query-based search of possible design flaws of SQL databases. In: Sobh, T., Elleithy, K. (eds.) Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. LNEE, vol. 313, pp. 53–60. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-06773-5_8CrossRefGoogle Scholar
- 3.Eessaar, E., Voronova, J.: Using SQL queries to evaluate the design of SQL databases. In: Elleithy, K., Sobh, T. (eds.) New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering. LNEE, vol. 312, pp. 179–186. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-06764-3_23CrossRefGoogle Scholar
- 4.Karwin, B.: SQL Antipatterns. The Pragmatic Bookshelf (2010)Google Scholar
- 5.Khumnin, P., Senivongse, T.: SQL antipatterns detection and database refactoring process. In: 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 199–205. IEEE (2017)Google Scholar
- 6.Korotkov, A.: Index support for regular expression search. In: Proceedings of PostgreSQL Conference (2012)Google Scholar
- 7.Nagy, C., Cleve, A.: A static code smell detector for SQL queries embedded in Java code. In: 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 147–152. IEEE (2017)Google Scholar