نتایج جستجو برای: inter transaction dependency

تعداد نتایج: 182250  

2006
Darijus Strasunskas Sari Hakkarainen

In practice dependency management often suffers from labor intensity and complexity in creating and maintaining the dependency relations. Our method targets projects, where developers are geographically distributed and a wide range of tools is used. A conceptual domain model is used to inter-relate the development objects and to automate dependency link discovery. The proposed method is based o...

1999
Frank Leymann

Abstract: During the last few years message queuing and workflow systems have been established as major elements of the software stack. In practice, this middleware is often used to cope with aspects of data federation: Message queuing technology is exploited for application integration. Workflows extend the notion of stored procedures in a federated environment and provide transaction manageme...

2017
Xiangyao Yu Siye Zhu Justin Kaashoek Andrew Pavlo Srinivas Devadas

Logging is crucial to performance in modern multicore main-memory database management systems (DBMSs). Traditional data logging (ARIES) and command logging algorithms enforce a sequential order among log records using a global log sequence number (LSN). Log flushing and recovery after a crash are both performed in the LSN order. This serialization of transaction logging and recovery can limit t...

2013
Marwa Ragheb Markus Dickinson

This paper reports on a study of interannotator agreement (IAA) for a dependency annotation scheme designed for learner English. Reliably-annotated learner corpora are a necessary step for the development of POS tagging and parsing of learner language. In our study, three annotators marked several layers of annotation over different levels of learner texts, and they were able to obtain generall...

2003
Seokwon Yang Stanley Y. W. Su Herman Lam

In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security service that generates, distributes, validates, and maintains the evidence of an electronic transaction. Quite of number of non-repudiation protocols have been proposed in distributed systems and evaluated based on som...

Journal: :CoRR 2004
Nathan LaBelle Eugene Wallingford

Internet-based repositories of open-source software provide a growing collection of software programs that interact with each other by code reuse. This software is developed by otherwise non-interacting, disjoint development groups with different goals, resources, and development methodologies. The software has a variety of functions, exists at assorted levels of maturity, and is written in a v...

2012
Prudhvi Kosaraju Bharat Ram Ambati Samar Husain Dipti Misra Sharma Rajeev Sangal

We present two approaches (rule-based and statistical) for automatically annotating intra-chunk dependencies in Hindi. The intra-chunk dependencies are added to the dependency trees for Hindi which are already annotated with inter-chunk dependencies. Thus, the intra-chunk annotator finally provides a fully parsed dependency tree for a Hindi sentence. In this paper, we first describe the guideli...

1996
Marcus Costa Sampaio Stéphane Turc

In this paper we present a new cooperative transaction model. The model has been developed using a data-driven approach, where we have not considered constraints specific to one application class, but only data-specific constraints. This approach is more general than the application-driven approach adopted in other cooperative transaction models. The notion of set of complementary objects is in...

2015
Yizhe Zhang Ricardo Henao Chunyuan Li Lawrence Carin

In dictionary learning for analysis of images, spatial correlation from extracted patches can be leveraged to improve characterization power. We propose a Bayesian framework for dictionary learning, where spatial location dependencies are captured by imposing a multiplicative Gaussian process prior on the latent units representing binary activations. Data augmentation and Kronecker methods allo...

2015
Ramzi A. Haraty Sanaa Kaddoura Ahmed Zekri

Intrusion detection systems can detect a malicious transaction in a database. However, sometimes this process takes time and the detection occurs after the transaction commits. Databases cannot take any action in this case and the damage will spread to a certain part of the database. There are some methods to recover the damaged part of the database. Nevertheless, any recovery algorithm should ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید