Design and Implementation of Linear Hash Structures in Nested Transactions Environmnet

نویسندگان

  • Sanjay Kumar Madria
  • Malik Ayed Tubaishat
چکیده

In this paper, we present formalization and an implementation of a linear hashing algorithm in nested transaction environment to handle large amount of data with increased concurrency. Nested transactions allow parallel execution of transactions, and handle transaction aborts in our system. First, We formalize the nested transaction model in a linear has structure environment using wellknown I/O automaton model. Next, we design a client/server model using layered system architecture. We have used object-oriented methodology in our system implementation that helps in designing and implementing the programming components formalized using I/O automaton model independently. In our model, buckets are modeled as automaton (later as objects) and linear hash operations are modeled as transaction automaton (later as methods). These methods correspond to nested transactions and are implemented using multithreading paradigm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance evaluation of linear hash structure model in a nested transaction environment

We design and implement a linear hash algorithm in nested transaction environment to handle large amount of data with increased concurrency. Nested transactions allow parallel execution of transactions, and handle transaction aborts, thus provides more concurrency and efficient recovery. We use object-oriented methodology in the implementation which helped in designing the programming component...

متن کامل

Nonlinear Analysis of Flow-induced Vibration in Fluid-conveying Structures using Differential Transformation Method with Cosine-Aftertreatment Technique

In this work, analytical solutions are provided to the nonlinear equations arising in thermal and flow-induced vibration in fluid-conveying structures using Galerkin-differential transformation method with cosine aftertreatment technique. From the analysis, it was established that increase of the length and aspect ratio of the fluid-conveying structures result in decrease the nonlinear vibratio...

متن کامل

Design and Implementation of a Non-pipelined MD5 Hardware Architecture Using a New Functional Description

MD5 is a cryptographic algorithm used for authentication. When implemented in hardware, the performance is affected by the data dependency of the iterative compression function. In this paper, a new functional description is proposed with the aim of achieving higher throughput by mean of reducing the critical path and latency. This description can be used in similar structures of other hash alg...

متن کامل

An Improved Hash Function Based on the Tillich-Zémor Hash Function

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007