期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
A BiLSTM cardinality estimator in complex database systems based on attention mechanism 被引量:3
1
作者 Qiang Zhou Guoping Yang +6 位作者 Haiquan Song Jin Guo Yadong Zhang Shengjie Wei Lulu Qu Louis Alberto Gutierrez Shaojie Qiao 《CAAI Transactions on Intelligence Technology》 SCIE EI 2022年第3期537-546,共10页
An excellent cardinality estimation can make the query optimiser produce a good execution plan.Although there are some studies on cardinality estimation,the prediction results of existing cardinality estimators are in... An excellent cardinality estimation can make the query optimiser produce a good execution plan.Although there are some studies on cardinality estimation,the prediction results of existing cardinality estimators are inaccurate and the query efficiency cannot be guaranteed as well.In particular,they are difficult to accurately obtain the complex relationships between multiple tables in complex database systems.When dealing with complex queries,the existing cardinality estimators cannot achieve good results.In this study,a novel cardinality estimator is proposed.It uses the core techniques with the BiLSTM network structure and adds the attention mechanism.First,the columns involved in the query statements in the training set are sampled and compressed into bitmaps.Then,the Word2vec model is used to embed the word vectors about the query statements.Finally,the BiLSTM network and attention mechanism are employed to deal with word vectors.The proposed model takes into consideration not only the correlation between tables but also the processing of complex predicates.Extensive experiments and the evaluation of BiLSTM-Attention Cardinality Estimator(BACE)on the IMDB datasets are conducted.The results show that the deep learning model can significantly improve the quality of cardinality estimation,which is a vital role in query optimisation for complex databases. 展开更多
关键词 ATTENTION BiLSTM cardinality estimation complex database systems query optimiser Word2vec
在线阅读 下载PDF
Scheduling transactions in mobile distributed real-time database systems 被引量:1
2
作者 雷向东 赵跃龙 +1 位作者 陈松乔 袁晓莉 《Journal of Central South University of Technology》 EI 2008年第4期545-551,共7页
A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environment... A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environments. At the mobile hosts, all transactions perform local pre-validation. The local pre-validation process is carried out against the committed transactions at the server in the last broadcast cycle. Transactions that survive in local pre-validation must be submitted to the server for local final validation. The new protocol eliminates conflicts between mobile read-only and mobile update transactions, and resolves data conflicts flexibly by using multiversion dynamic adjustment of serialization order to avoid unnecessary restarts of transactions. Mobile read-only transactions can be committed with no-blocking, and respond time of mobile read-only transactions is greatly shortened. The tolerance of mobile transactions of disconnections from the broadcast channel is increased. In global validation mobile distributed transactions have to do check to ensure distributed serializability in all participants. The simulation results show that the new concurrency control protocol proposed offers better performance than other protocols in terms of miss rate, restart rate, commit rate. Under high work load (think time is ls) the miss rate of DMVOCC-MVDA is only 14.6%, is significantly lower than that of other protocols. The restart rate of DMVOCC-MVDA is only 32.3%, showing that DMVOCC-MVDA can effectively reduce the restart rate of mobile transactions. And the commit rate of DMVOCC-MVDA is up to 61.2%, which is obviously higher than that of other protocols. 展开更多
关键词 mobile distributed real-time database systems muliversion optimistic concurrency control multiversion dynamic adjustment pre-validation multiversion data broadcast
在线阅读 下载PDF
Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
3
作者 Mohammed Amin Almaiah Leen Mohammad Saqr +3 位作者 Leen Ahmad Al-Rawwash Layan Ahmed Altellawi Romel Al-Ali Omar Almomani 《Computers, Materials & Continua》 SCIE EI 2024年第11期3189-3220,共32页
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues... Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks. 展开更多
关键词 Cyber threats database systems cyber risk assessment VULNERABILITIES COUNTERMEASURES
在线阅读 下载PDF
Weak Serializable Concurrency Control in Distributed Real-Time Database Systems
4
作者 党德鹏 刘云生 潘琳 《Journal of Shanghai University(English Edition)》 CAS 2002年第4期325-330,共6页
Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of sa... Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of satisfying the timing constraints of transactions, serializability is too strong as a correctness criterion and not suitable for real time databases in most cases. On the other hand, relaxed serializability including epsilon serializability and similarity serializability can allow more real time transactions to satisfy their timing constraints, but database consistency may be sacrificed to some extent. We thus propose the use of weak serializability(WSR) that is more relaxed than conflicting serializability while database consistency is maintained. In this paper, we first formally define the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol WDHP(weak serializable distributed high priority protocol) is outlined for distributed real time databases, where a new lock mode called mask lock mode is proposed for simplifying the condition of global consistency. Finally, through a series of simulation studies, it is shown that using the new concurrency control protocol the performance of distributed real time databases can be greatly improved. 展开更多
关键词 distributed real time database systems relaxed serializability real time concurrency control read only transactions.
在线阅读 下载PDF
Quasi Serializable Concurrency Control in Distributed Real-Time Database Systems
5
作者 党德鹏 Liu Yunsheng 《High Technology Letters》 EI CAS 2003年第1期72-76,共5页
This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, thro... This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, through a series of simulation studies, it shows that using the new concurrency control protocol the performance of distributed real-time databases can be much improved. 展开更多
关键词 distributed real-time database systems relaxing serializability real-tirne concurrency control
在线阅读 下载PDF
Multimedia Engineering Database Management Systems
6
作者 梁允荣 郭贵锁 +3 位作者 宋瀚涛 冯希 高春雷 郭胜 《Journal of Beijing Institute of Technology》 EI CAS 1996年第1期68-73,共6页
In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provide... In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency. 展开更多
关键词 database management systems multimedia technology engineering CAD
在线阅读 下载PDF
An OWL-Based Specification of Database Management Systems
7
作者 Sabin C.Buraga Daniel Amariei Octavian Dospinescu 《Computers, Materials & Continua》 SCIE EI 2022年第3期5537-5550,共14页
In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptual... In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks.Also,it can be used to improve the decision-making process for determining/selecting the appropriate DBMS,subject to specific requirements.The proposed model describes the most important features and aspects regarding the DBMS domain,including the support for various paradigms(relational,graph-based,key-value,tree-like,etc.),query languages,platforms(servers),plus running environments(desktop,Web,cloud),specific contexts—i.e.,focusing on optimizing queries,redundancy,security,performance,schema vs.schema-less approaches,programming languages/paradigms,and others.The process of populating the ontology with significant individuals(actual DBMSs)benefits from the existing knowledge exposed by free and open machine-processable knowledge bases,by using structured data fromWikipedia and related sources.The pragmatic use of our ontology is demonstrated by two educational software solutions based on current practices in Web application development,proving support for learning and experimenting key features of the actual semantic Web technologies and tools.This approach is also an example of using multiple knowledge from database systems,semanticWeb technologies,and software engineering areas. 展开更多
关键词 database management systems knowledge model web engineering
在线阅读 下载PDF
T4SP: A Novel Tool and Database for Type IV Secretion Systems in Bacterial Genomes
8
作者 ZHANG Wen YU Wei Wen +5 位作者 LIU Di LI Ming DU Peng Cheng WU Yi Lei George F. GAO CHEN Chen 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2013年第7期614-617,共4页
Secretion systems, macromolecules to pass which can mediate the across cellular membranes, are essential for virulent and genetic material exchange among bacterial species[1]. Type IV secretion system (T4SS) is one ... Secretion systems, macromolecules to pass which can mediate the across cellular membranes, are essential for virulent and genetic material exchange among bacterial species[1]. Type IV secretion system (T4SS) is one of the secretion systems and it usually consists of 12 genes: VirB1, VirB2 ...VirB11, and VirD4[2]. The structure and molecular mechanisms of these genes have been well analyzed in Gram-negative strains[3] and Gram-positive strains were once believed to be lack of T4SS. However, some recent studies revealed that one or more virB/D genes also exist in some kinds of Gram-positive bacteria and play similar role, and form a T4SS-like system[3]. The VirBl-like, VirB4, VirB6, and VirD4 genes were identified in the chromosome of Gram-positive bacterium Streptococcus suis in our previous studies and their role as important mobile elements for horizontal transfer to recipients in an 89 K pathogenicity island (PAl) was demonstrated[45]. However, their structure and molecular mechanisms in other strains, especially in Gram-positive strains, are remained unclear. 展开更多
关键词 T4SP A Novel Tool and database for Type IV Secretion systems in Bacterial Genomes
暂未订购
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
9
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
在线阅读 下载PDF
Construction of a database of average cross-sections in Chinese proximal femurs
10
作者 马如宇 王冬梅 +2 位作者 薛文东 戴尅戎 王成焘 《Journal of Southeast University(English Edition)》 EI CAS 2004年第2期191-194,共4页
The process of constructing a database of average cross-sections in Chinese proximal femurs is described. The main goal of creating the database is for designing hip stems for Chinese patients. Methods for constructin... The process of constructing a database of average cross-sections in Chinese proximal femurs is described. The main goal of creating the database is for designing hip stems for Chinese patients. Methods for constructing the database are introduced. According to some existing software and programs developed by the authors, a database of average cross-sections in Chinese proximal femurs was built based on CT images of eighty femur-specimens. 3-D shape of a patient's proximal femurs can be reconstructed according to the database and X-ray radiographs. Theoretical analyses and results of clinical application indicate that the database can be used to design hip stems for Chinese patients. 展开更多
关键词 Computerized tomography database systems Hip prostheses X ray films
在线阅读 下载PDF
Materials databases for the computational materials scientist 被引量:1
11
作者 Marcel H.F. Sluiter Darko Simonovic Emre S. Tasci 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2011年第3期303-308,共6页
Until recently, many computational materials scientists have shown little interest in materials databases. This is now changing be-cause the amount of computational data is rapidly increasing and the potential for dat... Until recently, many computational materials scientists have shown little interest in materials databases. This is now changing be-cause the amount of computational data is rapidly increasing and the potential for data mining provides unique opportunities for discovery and optimization. Here, a few examples of such opportunities are discussed relating to structural analysis and classification, discovery of correlations between materials properties, and discovery of unsuspected compounds. 展开更多
关键词 database systems MATERIALS data mining ab initio prediction structural analysis
在线阅读 下载PDF
Study on the System Design of Multiple Expert Systems Integrated Decision Support System
12
作者 Wang, Zongjun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1993年第1期74-81,共8页
There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing env... There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing environment. This paper is aimed at designing a multiple expert systems integrated decision support system (MESIDSS) to enhance decision makers' ability in more complex cases. The basic framework, management system of multiple ESs, and functions of MESIDSS are presented. The applications of MESIDSS in large-scale decision making processes are discussed from the following aspects of problem decomposing, dynamic combination of multiple ESs, link of multiple bases and decision coordinating. Finally, a summary and some ideas for the future are presented. 展开更多
关键词 Computational methods Computer architecture database systems Expert systems Information management Knowledge based systems Large scale systems Logic design systems analysis User interfaces
在线阅读 下载PDF
Hologamous integrating strategies for incipient fault diagnosis of transformer
13
作者 周建华 胡敏强 唐国庆 《Journal of Southeast University(English Edition)》 EI CAS 2004年第4期503-507,共5页
This paper studied an integrative fault diagnostic system on the power transformer. On-line monitor items were grounded current of iron core, internal partial discharge and oil dissolved gas. Diagnostic techniques wer... This paper studied an integrative fault diagnostic system on the power transformer. On-line monitor items were grounded current of iron core, internal partial discharge and oil dissolved gas. Diagnostic techniques were simple rule-based judgment, fuzzy logistic reasoning and neural network distinguishing. Considering that much faults information was interactional, intellectualized diagnosis was implemented based on integrating the neural network with the expert system. Hologamous integrating strategies were materialized by information-based integrating monitor devices, shared information database on several levels and fusion diagnosis software along thought patterns. The expert system practiced logic thought by logistic reasoning. The neural network realized image thought by model matching. Creative conclusion was educed by their integrating. The diagnosis example showed that the integrative diagnostic system was reasonable and practical. 展开更多
关键词 database systems Expert systems Fourier transforms Fuzzy control MONITORING Neural networks Program diagnostics
在线阅读 下载PDF
Application of fuzzy equivalence theory in data cleaning
14
作者 李华旸 刘玉葆 李又奎 《Journal of Southeast University(English Edition)》 EI CAS 2004年第4期454-457,共4页
This paper presented a rule merging and simplifying method and an improved analysis deviation algorithm. The fuzzy equivalence theory avoids the rigid way (either this or that) of traditional equivalence theory. Durin... This paper presented a rule merging and simplifying method and an improved analysis deviation algorithm. The fuzzy equivalence theory avoids the rigid way (either this or that) of traditional equivalence theory. During a data cleaning process task, some rules exist such as included/being included relations with each other. The equivalence degree of the being-included rule is smaller than that of the including rule, so a rule merging and simplifying method is introduced to reduce the total computing time. And this kind of relation will affect the deviation of fuzzy equivalence degree. An improved analysis deviation algorithm that omits the influence of the included rules' equivalence degree was also presented. Normally the duplicate records are logged in a file, and users have to check and verify them one by one. It's time-cost. The proposed algorithm can save users' labor during duplicate records checking. Finally, an experiment was presented which demonstrates the possibility of the rule. 展开更多
关键词 Data recording Data warehouses database systems MERGING SEMANTICS
在线阅读 下载PDF
Application of Petri Net to Fault Diagnosis in Satellite 被引量:3
15
作者 Ding Caihong School of Mechanics, DongHua University, Shanghai 200051, P R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2001年第2期92-96,共5页
A prototype of fault diagnosis based on Petri net, which is developed for a satellite tele-control subsystem, is introduced in this paper. Its structure is first given with the emphasis on a Petri net modeling tool wh... A prototype of fault diagnosis based on Petri net, which is developed for a satellite tele-control subsystem, is introduced in this paper. Its structure is first given with the emphasis on a Petri net modeling tool which is designed using the object oriented method. The prototype is connected to the database with DAO (Date Access Object) technique, and makes the Petri net's firing mechanism and its analyzing methods to be packed up as DLL (Dynamic Link Library) documents. Compared with the rule-based expert system method, the Petri net-based one can store the knowledge in mathematical matrix and make inference more quickly and effectively. 展开更多
关键词 database systems Expert systems Matrix algebra Object oriented programming Petri nets Software prototyping
在线阅读 下载PDF
A Novel Induction Algorithm for DM 被引量:3
16
作者 郑建国 刘芳 焦李成 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2001年第4期91-97,共7页
DM usually means an efficient knowledge discovery from database, and the immune algorithm is a biological theory-based and global searching algorithm. A novel induction algorithm is proposed here which integrates a po... DM usually means an efficient knowledge discovery from database, and the immune algorithm is a biological theory-based and global searching algorithm. A novel induction algorithm is proposed here which integrates a power of individual immunity and an evolutionary mechanism of population. This algorithm does not take great care of discovering some classifying information, but unknown knowledge or a predication on higher level rules. Theoretical analysis and simulations both show that this algorithm is prone to the stabilization of a population and the improvement of entire capability, and also keeping a high degree of preciseness during the rule induction. 展开更多
关键词 ALGORITHMS Computer simulation Data handling database systems
在线阅读 下载PDF
Constructing Projection Frequent Pattern Tree for Efficient Mining 被引量:1
17
作者 Xiang Jian-wen He Yan-xiang +1 位作者 Kokichi Futatsugi Kong Wei-qiang 《Wuhan University Journal of Natural Sciences》 EI CAS 2003年第02A期351-357,共7页
Frequent Pattern mining plays an essential role in data mining.Most of the previous studies adopt an Apriori-like candidate set generation-and-test approach.However,candidate set generation is still costly,especially ... Frequent Pattern mining plays an essential role in data mining.Most of the previous studies adopt an Apriori-like candidate set generation-and-test approach.However,candidate set generation is still costly,especially when there exist prolific patterns and/or long patterns.We introduce a novel frequent pattern growth(FP-growth)method,which is efficient and scalable for mining both long and short frequent patterns without candidate generation.And build a new projection frequent pattern tree(PFP-tree)algorithm,which not only heirs all the advantages in the FP-growth method,but also avoids it's bottleneck in database size dependence when constructing the frequent pattern tree(FP-tree).Efficiency of mining is achieved by introducing the projection technique,which avoid serial scan each frequent item in the database,the cost is mainly related to the depth of the tree,namely the number of frequent items of the longest transaction in the database,not the sum of all the frequent items in the database,which hugely shortens the time of tree-construction.Our performance study shows that the PFP-tree method is efficient and scalable for mining large databases or data warehouses,and is even about an order of magnitude faster than the FP-growth method. 展开更多
关键词 ALGORITHMS database systems Trees(mathematics)
在线阅读 下载PDF
Analysis and Study of Parallel Processing Mode inVLDB Decision Support System
18
作者 Zhang, Liming Feng, Qiujie 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第2期66-72,共7页
Nowadays, many kinds of computer network data management systems have been built widely in China. People have realized widely that management information system (MIS) has brought a revolution to the management mechani... Nowadays, many kinds of computer network data management systems have been built widely in China. People have realized widely that management information system (MIS) has brought a revolution to the management mechanism. Moreover, the managers of company need wide-range and comprehensive decision information more and more urgently which is the character of information explosion era. The needs of users become harsher and harsher in the design of MIS, and these needs have brought new problems to the general designers of MIS. Furthermore, the current method of traditional database development can't solve so big and complex problems of wide-range and comprehensive information processing. This paper proposes the adoption of parallel processing mode, the built of new decision support system (DSS) is to discuss and analyze the problems of information collection, processing and the acquirement of full-merit information with cross-domain and cross-VLDB (very-large database). 展开更多
关键词 Computer systems programming Data acquisition Data reduction database systems Decision support systems Response time (computer systems)
在线阅读 下载PDF
Genetic Algorithms for Auto-Clustering in KDD
19
作者 Li, Minqiang Li, Jianwu Kou, Jisong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第3期53-58,共6页
In solving the clustering problem in the context of knowledge discovery in databases (KDD), the traditional methods, for example, the K-means algorithm and its variants, usually require the users to provide the number... In solving the clustering problem in the context of knowledge discovery in databases (KDD), the traditional methods, for example, the K-means algorithm and its variants, usually require the users to provide the number of clusters in advance based on the pro-information. Unfortunately, the number of clusters in general is unknown to the users who are usually short of pro-information. Therefore, the clustering calculation becomes a tedious trial-and-error work, and the result is often not global optimal especially when the number of clusters is large. In this paper, a new dynamic clustering method based on genetic algorithms (GA) is proposed and applied for auto-clustering of data entities in large databases. The algorithm can automatically cluster the data according to their similarities and find the exact number of clusters. Experiment results indicate that the method is of global optimization by dynamically clustering logic. 展开更多
关键词 Data reduction database systems Error analysis OPTIMIZATION
在线阅读 下载PDF
A Partition Checkpoint Strategy Based on Data Segment Priority
20
作者 LIANG Ping LIU Yunsheng 《Wuhan University Journal of Natural Sciences》 CAS 2012年第2期109-113,共5页
A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to r... A partition checkpoint strategy based on data segment priority is presented to meet the timing constraints of the data and the transaction in embedded real-time main memory database systems(ERTMMDBS) as well as to reduce the number of the transactions missing their deadlines and the recovery time.The partition checkpoint strategy takes into account the characteristics of the data and the transactions associated with it;moreover,it partitions the database according to the data segment priority and sets the corresponding checkpoint frequency to each partition for independent checkpoint operation.The simulation results show that the partition checkpoint strategy decreases the ratio of trans-actions missing their deadlines. 展开更多
关键词 embedded real-time main memory database systems database recovery partition checkpoint data segment priority
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部