منابع مشابه
Timestamp-Based Orphan Elimination
An orphan in a distributed transaction system is an activity executing on behalf of an aborted transaction. Orphans are undesirable because they waste system resources and because they may observe inconsistent data. This paper proposes a new method for managing orphans created by crashes and by aborts. The method ensures that orphans are detected and eliminated in a timely manner, and it preven...
متن کاملTime-Driven Orphan Elimination
An orphan in a transaction system is an activity executing on behalf of an aborted transaction. This paper proposes a new method for managing orphans created by crashes and by aborts. The method prevents orphans from observing inconsistent states, and ensures that orphans are detected and eliminated in a timely manner. A major advantage of this method is simplicity: it is easy to understand, to...
متن کاملA compressed and dynamic-range-based expression of timestamp and period for timestamp-based schedulers
* This work has been supported in part by the New Jersey Commission on Science and Technology via the NJ Center for Wireless Telecommunications, and the New Jersey Commission on Higher Education via the NJ I-TOEWR project. Abstract – Scheduling algorithms are implemented in highspeed switches to provision Quality-of-Service guarantees in both cell-based and packet-based networks. Being able to ...
متن کاملA TimeStamp Based Multi-version STM Algorithm
Software Transactional Memory Systems (STM) are a promising alternative for concurrency control in shared memory systems. Multiversion STM systems maintain multiple versions for each t-object. The advantage of storing multiple versions is that it facilitates successful execution of higher number of read operations than otherwise. Multi-Version permissiveness (mv-permissiveness) is a progress co...
متن کاملTimestamp Based Execution Control for C and Java Programs
Many programmers have had to deal with an overwritten variable resulting for example from an aliasing problem. The culprit is obviously the last write-access to that memory location before the manifestation of the bug. The usual technique for removing such bugs starts with the debugger by (1) finding the last write and (2) moving the control point of execution back to that time by re-executing ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 1989
ISSN: 0098-5589
DOI: 10.1109/32.29482