Results 1 to 10 of about 8,285 (212)

An optimized deterministic concurrency control approach for geo-distributed transaction processing on permissioned blockchains [PDF]

open access: yesScientific Reports
Concurrency control is crucial for ensuring consistency and isolation in distributed transaction processing. Traditional concurrency control algorithms, such as locking-based protocols, usually suffer from performance degradation due to heavy transaction
Zhibo Han   +6 more
doaj   +2 more sources

Transparent Concurrency Control: Decoupling Concurrency Control from DBMS [PDF]

open access: greenCoRR, 2019
For performance reasons, conventional DBMSes adopt monolithic architectures. A monolithic design cripples the adaptability of a DBMS, making it difficult to customize, to meet particular requirements of different applications. In this paper, we propose to completely separate the code of concurrency control (CC) from a monolithic DBMS. This allows us to
Ningnan Zhou   +3 more
openalex   +3 more sources

Concurrency control [PDF]

open access: yesACM Computing Surveys, 1998
Standard locking (two-phase locking with on-demand lock requests and blocking upon lock conflict) is the primary concurrency control (CC) method for centralized databases. The main source of performance degradation with standard locking is blocking, whereas transaction (txn) restarts to resolve deadlocks have a secondary effect on performance.
Alexander Thomasian, Thomasianalexander
exaly   +2 more sources

Adaptive Tip Selection for DAG-Shard-Based Federated Learning with High Concurrency and Fairness [PDF]

open access: yesSensors
To cope with the challenges posed by high-concurrency training tasks involving large models and big data, Directed Acyclic Graph (DAG) and shard were proposed as alternatives to blockchain-based federated learning, aiming to enhance training concurrency.
Ruiqi Xiao, Yun Cao, Bin Xia
doaj   +2 more sources

Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol [PDF]

open access: yesScientific Reports
This paper introduces a novel Reinforcement Learning-Based Hybrid Validation Protocol (RL-CC) that revolutionizes conflict resolution for time-sensitive IoT transactions through adaptive edge-cloud coordination. Efficient transaction management in sensor-
Mohammad A. Al Khaldy   +7 more
doaj   +2 more sources

Contextual concurrency control [PDF]

open access: yesProceedings of the Workshop on Hot Topics in Operating Systems, 2021
Kernel synchronization primitives are of paramount importance to achieving good performance and scalability for applications. However, they are usually invisible and out of the reach of application developers. Instead, kernel developers and synchronization experts make all the decisions regarding kernel lock design. In this paper, we propose contextual
Sujin Park   +3 more
openaire   +1 more source

RDMA Optimization Technology for Two-Phase Locking Concurrency Control [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
Performance optimization of distributed transactions is one of the hottest topics in academic and industry community. Concurrency control technology based on two-phase locking can guarantee the correctness of concurrent transaction scheduling, thus it is
LI Jingyao, ZHANG Qian, ZHAO Zhanhao, LU Wei, ZHANG Xiao, DU Xiaoyong
doaj   +1 more source

Syntactic control of concurrency [PDF]

open access: yesTheoretical Computer Science, 2004
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dan R. Ghica   +2 more
openaire   +3 more sources

A new secure 2PL real-time concurrency control algorithm (ES2PL)

open access: yesInternational Journal of Intelligent Networks, 2022
A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity.
Ebrahim Abduljalil   +4 more
doaj   +1 more source

Concurrency Control and Consistency Over Erasure Coded Data

open access: yesIEEE Access, 2022
For over a decade, erasure codes have become an integral part of large-scale data storage solutions and data-centers. However, in commercial systems, they are, so far, used predominantly for static data.
Anwitaman Datta, Frederique Oggier
doaj   +1 more source

Home - About - Disclaimer - Privacy