Sciweavers

754 search results - page 37 / 151
» Transaction Processing in PRO-MOTION
Sort
View
TDSC
2008
87views more  TDSC 2008»
15 years 1 months ago
Credit Card Fraud Detection Using Hidden Markov Model
Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for bo...
Abhinav Srivastava, Amlan Kundu, Shamik Sural, Aru...
TODS
2012
13 years 4 months ago
A survey of B-tree logging and recovery techniques
B-trees have been ubiquitous in database management systems for several decades, and they serve in many other storage systems as well. Their basic structure and their basic operat...
Goetz Graefe
DNIS
2007
Springer
114views Database» more  DNIS 2007»
15 years 8 months ago
Improving the Performance of Read-Only Transactions Through Speculation
A read-only transaction (ROT) does not modify any data. The main issues regarding processing ROTs are correctness, data currency and performance. Two-phase Locking (2PL) protocol i...
Thirumalaisamy Ragunathan, P. Krishna Reddy
HICSS
1994
IEEE
111views Biometrics» more  HICSS 1994»
15 years 6 months ago
Fault-Tolerance for Communicating Multidatabase Transactions
In this paper we propose a framework that can be used for the implementation of reliable multi database system communication protocols. The framework provides transactions on shar...
eva Kühn
ETS
2007
IEEE
105views Hardware» more  ETS 2007»
15 years 8 months ago
Communication-Centric SoC Debug Using Transactions
— The growth in System-on-Chip complexity puts pressure on system verification. Due to limitations in the pre-silicon verification process, errors in hardware and software slip...
Bart Vermeulen, Kees Goossens, Remco van Steeden, ...