Sciweavers

2678 search results - page 65 / 536
» Operational Semantics of Transactions
Sort
View
TODS
2012
13 years 6 months ago
A survey of B-tree logging and recovery techniques
B-trees have been ubiquitous in database management systems for several decades, and they serve in many other storage systems as well. Their basic structure and their basic operat...
Goetz Graefe
143
Voted
KBSE
2007
IEEE
15 years 10 months ago
Ensuring consistency in long running transactions
Flow composition languages permit the construction of longrunning transactions from collections of independent, atomic services. Due to environmental limitations, such transaction...
Jeffrey Fischer, Rupak Majumdar
MANSCI
2006
94views more  MANSCI 2006»
15 years 4 months ago
Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy
Most successful online marketplaces today are owned and operated by firms that are themselves traders in the marketplace. This raises significant concerns about the fairness of th...
Joakim Kalvenes, Amit Basu
ICEIS
2003
IEEE
15 years 9 months ago
Distributed Overload Control for Real-Time Replicated Database Systems
: In order to meet their temporal constraints, current applications such as Web-based services and electronic commerce use the technique of data replication. To take the replicatio...
Samia Saad-Bouzefrane, Claude Kaiser
INFOSCALE
2007
ACM
15 years 5 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü