Sciweavers

188 search results - page 11 / 38
» A Formal Implementation of Value Commitment
Sort
View
ICDE
2004
IEEE
119views Database» more  ICDE 2004»
14 years 9 months ago
Improving Logging and Recovery Performance in Phoenix/App
Phoenix/App supports software components whose states are made persistent across a system crash via redo recovery, replaying logged interactions. Our initial prototype force logge...
Roger S. Barga, Shimin Chen, David B. Lomet
SIGMOD
2004
ACM
103views Database» more  SIGMOD 2004»
14 years 7 months ago
A Read-Only Transaction Anomaly Under Snapshot Isolation
Snapshot Isolation (SI), is a multi-version concurrency control algorithm introduced in [BBGMOO95] and later implemented by Oracle. SI avoids many concurrency errors, and it never ...
Alan Fekete, Elizabeth J. O'Neil, Patrick E. O'Nei...
JASIS
2007
89views more  JASIS 2007»
13 years 7 months ago
Does topic metadata help with Web search?
It has been claimed that topic metadata can be used to improve the accuracy of text searches. Here, we test this claim by examining the contribution of metadata to effective search...
David Hawking, Justin Zobel
IJMI
2002
142views more  IJMI 2002»
13 years 7 months ago
Quality assured trusted third parties for deploying secure internet-based healthcare applications
In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
ISOLA
2010
Springer
13 years 6 months ago
A Memory Model for Static Analysis of C Programs
Automatic bug finding with static analysis requires precise tracking of different memory object values. This paper describes a memory modeling method for static analysis of C pro...
Zhongxing Xu, Ted Kremenek, Jian Zhang