Sciweavers

251 search results - page 13 / 51
» Transactions with isolation and cooperation
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
KBSE
2003
IEEE
14 years 3 months ago
Testing Database Transaction Concurrency
Database application programs are often designed to be executed concurrently by many clients. By grouping related database queries into transactions, DBMS systems can guarantee th...
Yuetang Deng, Phyllis G. Frankl, Zhongqiang Chen
CHI
2005
ACM
14 years 10 months ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
GECCO
2006
Springer
134views Optimization» more  GECCO 2006»
14 years 1 months ago
The Baldwin effect under spatial isolation and autonomous reproduction
The impact of learning on evolution in dynamic environments undergoes recognized stages of the Baldwin Effect although its cause is not clear. To identify it experimentally, we de...
H. L. Peng, J. C. Tay
SOSP
2007
ACM
14 years 6 months ago
TxLinux: using and managing hardware transactional memory in an operating system
TxLinux is a variant of Linux that is the first operating system to use hardware transactional memory (HTM) as a synchronization primitive, and the first to manage HTM in the sc...
Christopher J. Rossbach, Owen S. Hofmann, Donald E...