Results 1 to 10 of about 2,534,483 (361)

Testing database transaction concurrency [PDF]

open access: yes18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings., 2004
Database application programs are often designed to be executed concurrently by many users. By grouping related database queries into transactions, DBMS (database management system) can guarantee that each transaction satisfies the well-known ACID properties: atomicity, consistency, isolation, and durability.
Yuetang Deng   +2 more
openaire   +3 more sources

A Transaction Model for XML Databases [PDF]

open access: yesWorld Wide Web, 2004
Abstract The hierarchical and semistructured nature of XML data may cause complicated update behavior. Updates should not be limited to entire document trees, but should ideally involve subtrees and even individual elements. Providing a suitable scheduling algorithm for semistructured data can significantly improve collaboration systems that store ...
Dekeyser, Stijn   +2 more
openaire   +4 more sources

Transactions and updates in deductive databases [PDF]

open access: yesIEEE Transactions on Knowledge and Data Engineering, 1997
In this paper, we develop a new approach that provides a smooth integration of extensional updates and declarative query languages for deductive databases. The approach is based on a declarative specification of updates in rule bodies. Updates are not executed as soon as evaluated.
E. BERTINO   +2 more
openaire   +3 more sources

Generation of Database Transactions with Petri Nets [PDF]

open access: yesFundamenta Informaticae, 2009
Deleting a record from a database table without modifying other records or tables can easily lead to a violation of the database constraints. The same holds for other database operations. In this paper we generate descriptions of transactions triggered by a given operation, guaranteeing that if the database is in a consistent state ...
Kees M. van Hee   +3 more
openaire   +3 more sources

Verifiable Properties of Database Transactions

open access: yesInformation and Computation, 1996
AbstractIt is often necessary to ensure that database transactions preserve integrity constraints that specify valid database states. While it is possible to monitor for violations of constraints at run-time, rolling back transactions when violations are detected, it is preferable to verify correctness statically,beforetransactions are executed.
Leonid Libkin   +2 more
openaire   +2 more sources

Transaction reordering in replicated databases [PDF]

open access: yesProceedings of SRDS'97: 16th IEEE Symposium on Reliable Distributed Systems, 2002
The paper presents a fault tolerant lazy replication protocol that ensures 1-copy serializability at a relatively low cost. Unlike eager replication approaches, our protocol enables local transaction execution and does not lead to any deadlock situation.
André Schiper   +2 more
openaire   +2 more sources

Statistical and fuzzy approach for database security [PDF]

open access: yes, 2007
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on statistical and fuzzy set theories for Cumulated Anomaly, is proposed. DDM
Lu, G, Lü, K, Yi, J
core   +1 more source

A dubiety-determining based model for database cumulated anomaly intrusion [PDF]

open access: yes, 2007
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions ...
Lu, G, Lü, K, Yi, J
core   +1 more source

ETP-Mine: An Efficient Method for Mining Transitional Patterns [PDF]

open access: yes, 2010
A Transaction database contains a set of transactions along with items and their associated timestamps. Transitional patterns are the patterns which specify the dynamic behavior of frequent patterns in a transaction database.
Bhaskar, A., Kumar, B. Kiran
core   +2 more sources

Home - About - Disclaimer - Privacy