Sciweavers

186 search results - page 37 / 38
» Transactional Mutex Locks
Sort
View
SIGMOD
2011
ACM
193views Database» more  SIGMOD 2011»
12 years 8 months ago
Fast checkpoint recovery algorithms for frequently consistent applications
Advances in hardware have enabled many long-running applications to execute entirely in main memory. As a result, these applications have increasingly turned to database technique...
Tuan Cao, Marcos Antonio Vaz Salles, Benjamin Sowe...
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 7 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
IPPS
2003
IEEE
13 years 11 months ago
SoCBUS: Switched Network on Chip for Hard Real Time Embedded Systems
With the current trend in integration of more complex systems on chip there is a need for better communication infrastructure on chip that will increase the available bandwidth an...
Daniel Wiklund, Dake Liu
ELPUB
1998
ACM
13 years 10 months ago
Evolving Ecological Niches: Technological Change and the Transformation of the Libraries Role in Publishing
Print has been the most significant scholarly communication technology for the last three hundred years (at least). Kaufer and Carley’s Ecology of Communicative Transactions ana...
Andrew E. Treloar
VLDB
1993
ACM
107views Database» more  VLDB 1993»
13 years 9 months ago
Recovering from Main-Memory Lapses
Recovery activities, like logging, checkpointing and restart, are used to restore a database to a consistent state after a system crash has occurred. Recovery related overhead is ...
H. V. Jagadish, Abraham Silberschatz, S. Sudarshan