Sciweavers

748 search results - page 73 / 150
» concurrency 2008
Sort
View
PVLDB
2010
138views more  PVLDB 2010»
14 years 11 months ago
The Case for Determinism in Database Systems
Replication is a widely used method for achieving high availability in database systems. Due to the nondeterminism inherent in traditional concurrency control schemes, however, sp...
Alexander Thomson, Daniel J. Abadi
APLAS
2008
ACM
15 years 2 months ago
Reasoning about Java's Reentrant Locks
This paper presents a verification technique for a concurrent Java-like language with reentrant locks. The verification technique is based on permissionaccounting separation logic....
Christian Haack, Marieke Huisman, Clément H...
80
Voted
SIGCSE
2008
ACM
92views Education» more  SIGCSE 2008»
15 years 15 days ago
Patterns for programming in parallel, pedagogically
Pipeline, Delta, and Black Hole are three simple patterns used in concurrent software design. We recently presented these and other patterns for parallelism at a nine-hour worksho...
Matthew C. Jadud, Jon Simpson, Christian L. Jacobs...
APSEC
2008
IEEE
15 years 7 months ago
Using Abstraction to Verify Arbitrary Temporal Properties
straction to Verify Arbitrary Temporal Properties Amir Pnueli New York University and Weizmann Institute of Sciences (Emeritus) Perspectives in Concurrency Theory, Chennai, 15 Dece...
Amir Pnueli
109
Voted
TODS
2010
108views more  TODS 2010»
14 years 11 months ago
A survey of B-tree locking techniques
: © A survey of B-tree locking techniques Goetz Graefe HP Laboratories HPL-2010-9 storage systems, databases, B-tree, indexes, concurrency control, locking B-trees have been ubiqu...
Goetz Graefe