نتایج جستجو برای: transaction processing

تعداد نتایج: 520053  

2004
Tianzhou Chen Yi Lian Jiangwei Huang

Real-time transaction processing becomes concerns as embedded time coming rapidly. However, the transaction process in real-time embedded system still has some problems in resource utilization at present. In this paper, a classification is designed to differentiate the hard periodic real-time transactions and hard sporadic real-time transactions. The new processing algorithm for hard sporadic r...

2001
Yan Huang Yann-Hang Lee

Observing that it is impractical to use traditional methods to control concurrency for transaction processing in broadcast-based asymmetric communication environment, this paper introduces a concurrency control protocol designed for broadcast-based transaction processing called STUBcast (Server Timestamp and Update Broadcast Supported Concurrency). It then focuses on the correctness proof of ST...

2007
Dennis Wildfogel Ramana Yerneni

Testing the reliability of high performance transaction processing systems poses many diicult challenges that are not adequately answered by conventional testing techniques. We discuss a new test paradigm, which is dynamic and exploratory in nature, and discuss its ability to meet these challenges. We describe an implementation of this paradigm in products that aid in eeciently testing reliable...

2000
Abdelsalam Helal Hua Li

Rainbow is a Java and web-based distributed database system designed for academic purposes, and serves as an exercise to understand concepts of distributed transactions and transaction management including concurrency control, atomic actions, data replication, and fault tolerance. The motivation for the Rainbow project is twofold. First, Rainbow can be used as a teaching tool. Graduate students...

Journal: :J. Inf. Sci. Eng. 2000
San-Yih Hwang

We propose a new transaction execution model in a mobile environment where a subset of data items is cached by each mobile host. This execution model allows each mobile host to execute transactions locally and, before their commits, to request certification from the database server on the wired network. The database server certifies a commit request only when the execution of its pertaining tra...

Journal: :IEEE Data Eng. Bull. 2016
Irene Zhang Naveen Kr. Sharma Adriana Szekeres Arvind Krishnamurthy Dan R. K. Ports

Today’s replicated transactional storage systems typically have a layered architecture, combining protocols for transaction coordination, consistent replication, and concurrency control. These systems generally require costly strongly-consistent replication protocols like Paxos, which assign a total order to all operations. To avoid this cost, we ask whether all replicated operations in these s...

Journal: :CoRR 2012
Shatrughan Modi Seema Bawa

Coins are frequently used in everyday life at various places like in banks, grocery stores, supermarkets, automated weighing machines, vending machines etc. So, there is a basic need to automate the counting and sorting of coins. For this machines need to recognize the coins very fast and accurately, as further transaction processing depends on this recognition. Three types of systems are avail...

Journal: :CoRR 2013
Osama El-Sayed Sheta Ahmed Nour Eldeen

This paper describes the technology of data warehouse in healthcare decision-making and tools for support of these technologies, which is used to cancer diseases. The healthcare executive managers and doctors needs information about and insight into the existing health data, so as to make decision more efficiently without interrupting the daily work of an On-Line Transaction Processing (OLTP) s...

2007
Ronald C. Unrau Michael Stumm Orran Krieger

Demand-driven systems follow the model where customers enter the system, request some service, and then depart. Examples are databases, transaction processing systems and operating systems, which form the system software layer between the applications and the hardware. Achieving scalability at the system software layer is critical for the scalability of the system as a whole, and yet this layer...

Journal: :I. J. Network Security 2009
Navdeep Kaur Rajwinder Singh Manoj Misra Anil Kumar Sarje

A multilevel secure database is intended to protect classified information from unauthorized users based on the classification of the data and the clearances of the users. The concurrency control requirements for transaction processing in multilevel secure database management systems (MLS/DBMSs) are different from those in conventional transaction processing systems. In MLS/DBMSs, coordination ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید