Results 301 to 310 of about 17,478,568 (370)
Some of the next articles are maybe not open access.
Fast In-Memory Transaction Processing Using RDMA and HTM
ACM Transactions on Computer Systems, 2017DrTM is a fast in-memory transaction processing system that exploits advanced hardware features such as remote direct memory access (RDMA) and hardware transactional memory (HTM). To achieve high efficiency, it mostly offloads concurrency control such as
Haibo Chen+7 more
semanticscholar +1 more source
An efficient transaction processing method on the distributed database
2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2016Distributed system have shown its good robustness, extensibility and effectiveness in the processing, storage and transmission of large data. Now with the expansion of the amount of data and application, it has become a challenging task to ensure its ...
Qiao Sun+3 more
semanticscholar +1 more source
Transaction processing on confidential data using cipherbase
IEEE International Conference on Data Engineering, 2015Cipherbase is a comprehensive database system that provides strong end-to-end data confidentiality through encryption. Cipherbase is based on a novel architecture that combines an industrial strength database engine (SQL Server) with lightweight ...
A. Arasu+5 more
semanticscholar +1 more source
E-Store: Fine-Grained Elastic Partitioning for Distributed Transaction Processing
Proceedings of the VLDB Endowment, 2014On-line transaction processing (OLTP) database management systems (DBMSs) often serve time-varying workloads due to daily, weekly or seasonal fluctuations in demand, or because of rapid growth in demand due to a company's business success.
Rebecca Taft+7 more
semanticscholar +1 more source
Distributed logging for transaction processing
Proceedings of the 1987 ACM SIGMOD international conference on Management of data - SIGMOD '87, 1987Increased interest in using workstations and small processors for distributed transaction processing raises the question of how to implement the logs needed for transaction recovery. Although logs can be implemented with data written to duplexed disks on each processing node, this paper argues there are advantages if log data is written to
Dean S. Thompson+2 more
openaire +1 more source
Transference Process and Transactional Process
Transactional Analysis Journal, 1991This article focuses only on TA, and specifically on one aspect of TA theory: behavioral and social tools.
openaire +2 more sources
A traditional presupposition in science is that nature ultimately is simple and comprehensible. Accordingly, ‘theory reduction’ is a primary goal in much of ecosystems science – the belief, for example, that ecosystem development can be described by a single covering principle.
openaire +2 more sources
Traditional Transaction Processing
2000The primary purpose of a database management system is to carry out transactions. A transaction is a sequence of database operations either to query or manipulate data in a shared database. The goal of a concurrency control (CC) mechanism is to preserve database integrity, even in the presence of concurrent data accesses by multiple users, by properly ...
Vijay Atluri+2 more
openaire +2 more sources
Dynamic Load Balancing in Real-Time Distributed Transaction Processing
IEEE International Conference on Computational Science and Engineering, 2013Transaction processing in distributed environments can lead to load imbalances resulting in performance degradation despite resources being available.
W. Haque, A. Toms, A. Germuth
semanticscholar +1 more source
2020
This is a code-intensive chapter. In the previous two chapters, we have examined the theory of cryptocurrency transactions and seen how the merkle root can be used to verify that the transactions in a block have not been tampered with. In this chapter, we are going to put this theoretical knowledge into practice by implementing Python code for ...
openaire +2 more sources
This is a code-intensive chapter. In the previous two chapters, we have examined the theory of cryptocurrency transactions and seen how the merkle root can be used to verify that the transactions in a block have not been tampered with. In this chapter, we are going to put this theoretical knowledge into practice by implementing Python code for ...
openaire +2 more sources