Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Abstract— We have developed log-based recovery for middleware servers that access back-end transaction systems (DBMSs). Transactional consistency is provided between in-memory st...
The maindi culty in enforcing globalserializabilityin a multidatabase environment lies in resolving indirect (transitive) con icts between multidatabase transactions. Indirect con...
Dimitrios Georgakopoulos, Marek Rusinkiewicz, Amit...
For very large databases such as those used by banks and airlines, cost considerations may forbid shutting down the service for a long period of time and reorganizing off-line. Si...