Results 331 to 340 of about 163,748 (368)

Serializable executions with Snapshot Isolation and two-phase locking: Revisited [PDF]

open access: possible2013 ACS International Conference on Computer Systems and Applications (AICCSA), 2013
Snapshot Isolation (SI) is a concurrency control mechanism that has been implemented by several commercial and open resources platforms. However, under SI, a set of program may experience a non-serializable execution, in which database integrity constraints can be violated.
openaire   +1 more source

Two-phase locking performance and its thrashing behavior

ACM Transactions on Database Systems, 1993
A novel mean value analysis method for the two-phase locking (2PL) concurrency control method with the general waiting policy is presented here, which extends previous work to the important case of variable-size transactions, where size is determined by the number of locks requested by the transaction.
openaire   +1 more source

Simulation Studies Of The Implementation Of Centralized Two-Phase Locking In DDBMS

ECMS 2015 Proceedings edited by: Valeri M. Mladenov, Petia Georgieva, Grisha Spasov, Galidiya Petrova, 2015
One of the most important problems in distributed database systems is the concurrency control. This paper considers algorithms simulating the implementation of centralized two-phase locking (2PL) in distributed database systems and simulation results.
Svetlana Vasileva, Alina Culciar
openaire   +2 more sources

Frequency locking in a periodically forced thermal two-phase oscillator

Dynamics of Atmospheres and Oceans, 1984
Abstract Welander (1977) showed that a fluid, heated internally and cooled to freezing from above, can for a certain parameter range and for steady thermal forcing demonstrate oscillatory behaviour with ice-covered and ice-free states alternating.
Lars Rahm, Peter Lundberg
openaire   +2 more sources

Parametric excitations and lock-in of flexible hydrofoils in two-phase flows

Journal of Fluids and Structures, 2015
Abstract This work introduces a reduced-order method to study the parametric excitations and lock-in of flexible hydrofoils caused by unsteady two-phase (cavitating) flow. The reduced-order method is based on a 1-DOF structural model coupled with a van der Pol wake oscillator with empirically derived relations for the variation in lift, cavity-length,
Deniz Tolga Akcabay, Yin Lu Young
openaire   +2 more sources

A Case for Non-Two-Phase Locking Protocols that Ensure Atomicity [PDF]

open access: possibleIEEE Transactions on Software Engineering, 1983
A transaction is atomic if it can be considered, as far as other transactions are concerned, to be indivisible and instantaneous even in the case of failure. An almost universally accepted way to ensure atomicity is to use a strict two-phase locking protocol with a roll-back scheme for recovery in case of deadlock or failure.
openaire   +1 more source

Frequency-following reference oscillator for a two-phase lock-in amplifier

Review of Scientific Instruments, 1979
The circuit for a frequency-following oscillator is described for use in obtaining a commensurate reference for a two-phase lock-in amplifier. This device is useful in tracking signals which drift slowly in frequency and which are apt to be either intermittent or momentarily small in amplitude, as in the Brownian motion of a mechanical oscillator ...
openaire   +3 more sources

Transaction Locks, Two-Phase Commit and Deadlocks

1998
Access to the database occurs within the framework of short and long transactions. As we have seen, each transaction consists of a sequence of operations on the database, with practically no pre-established limits to the time spent in a transaction or number of operations performed for its execution.
openaire   +2 more sources

Implementation and modeling of two-phase locking concurrency control—a performance study

Information and Software Technology, 2000
Abstract Two-phase locking (2PL) is the concurrency control mechanism that is used in most commercial database systems. In 2PL, for a transaction to access a data item, it has to hold the appropriate lock (read or write) on the data item by issuing a lock request. While the way transactions set their lock requests and the way the requests are granted
Hossam S. Hassanein   +2 more
openaire   +2 more sources

Performance Comparison of Static vs. Dynamic Two Phase Locking Protocols

Journal of Database Management, 1992
Queuing network models have been used extensively in the study of the performance of different concurrency control protocols in database systems. However, the results obtained are mostly qualitative in nature with few quantitative design rules which address performance issues such as data and resource contentions.
Sheung-Lun Hung, Kam-Yiu Lam
openaire   +2 more sources

Home - About - Disclaimer - Privacy