Sciweavers

417 search results - page 70 / 84
» Data-Oriented Transaction Execution
Sort
View
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
15 years 4 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
SPAA
2010
ACM
15 years 2 months ago
TLRW: return of the read-write lock
TL2 and similar STM algorithms deliver high scalability based on write-locking and invisible readers. In fact, no modern STM design locks to read along its common execution path b...
David Dice, Nir Shavit
RULES
1995
Springer
92views Database» more  RULES 1995»
15 years 1 months ago
Rule Contexts in Active Databases - A Mechanism for Dynamic Rule Grouping
Engineering applications that use Active DBMSs (ADBMSs) often need to group activities into modes that are shifted during the execution of different tasks. This paper presents a me...
Martin Sköld, Esa Falkenroth, Tore Risch
TSE
2008
131views more  TSE 2008»
14 years 9 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
RCIS
2010
14 years 8 months ago
A Tree-based Approach for Efficiently Mining Approximate Frequent Itemsets
—The strategies for mining frequent itemsets, which is the essential part of discovering association rules, have been widely studied over the last decade. In real-world datasets,...
Jia-Ling Koh, Yi-Lang Tu