19,110 Hits in 5.8 sec

Commit Protocols in Mobile Environments: Design & Implementation

Salman Abdul Moiz, Lakshmi Rajamani, Supriya N.Pal
2010 International Journal of Database Management Systems  
Most of the approaches use locking mechanisms to achieve concurrency control. This leads to increase in blocking and abort rate in mobile environments.  ...  To reduce deadlocks and blocking of resources an enhanced optimistic approach for concurrency control is proposed.  ...  To achieve concurrency control, two phase locking protocol was used in the traditional environment.  ... 
doi:10.5121/ijdms.2010.2310 fatcat:cvrntc7zxzgbxgmbvg26umc5ya

Transaction Processing, Techniques In Mobile Database: An Overview

Adil Mobarek, Siddig Abdelrhman, Areege Abdel-Mutal, Sara Adam, Nawal Elbadri, Tarig Mohammed Ahmed
2015 International Journal on Computational Science & Applications  
of mobile environment, transaction is the center component in database systems, In this paper we present useful work done in mobile transaction, we show the mobile database environment and overview a  ...  The advancement in mobile technology and wireless network increase the using of mobile device in database driven application, these application require high reliability and availability due to nature inheritance  ...  The second method for increasing concurrency control is Optimistic concurrency control, in this mechanism the data items are not locked and can be updated by more than one mobile host at the same time  ... 
doi:10.5121/ijcsa.2015.5101 fatcat:xzwqrpsguvhvbbxfkrhsx7kuwy

A Real Time Optimistic Strategy to achieve Concurrency Control in Mobile Environments Using On-demand Multicasting

Salman Abdul Moiz, Lakshmi Rajamani
2010 International Journal of Wireless & Mobile Networks  
Most of the approaches use locking mechanisms to achieve concurrency control. However this leads to increase in blocking and abort rate.  ...  In this paper an optimistic concurrency control strategy using on-demand multicasting is proposed for mobile database environments which guarantees consistency and introduces application-specific conflict  ...  ., locking, timestamps and optimistic concurrency control. Though these schemes are well suited for traditional database applications, they don't work efficiently in mobile environments.  ... 
doi:10.5121/ijwmn.2010.2212 fatcat:qhvumpf6x5hurjmo6scozbj7du

Transaction Management in a Mobile Data Access System [chapter]

2001 Annual Review of Scalable Computing  
Transaction processing and concurrency control issues are analyzed. Finally, a taxonomy for concurrency control algorithms for both multidatabases and MDAS environments is introduced.  ...  This article is intended to address the issue of concurrency control within a multidatabase and an MDAS environment. Similarities and differences of multidatabases and MDAS environment are discussed.  ...  Note that the GTM is the only unit responsible for global concurrency control in this approach.  ... 
doi:10.1142/9789812810182_0004 fatcat:4hzigjspfzarvlwxuzfosfaocy

Distributed Transactions and Distributed Concurrency Control

2021 International journal of computer science and mobile computing  
It is impracticable to maintain the integrity of the database system in a concurrent environment without concurrency control techniques.  ...  Concurrency control is one of the essential tasks of any database management system.  ...  The study discusses various lock based concurrency control techniques for distributed database management systems.  ... 
doi:10.47760/ijcsmc.2021.v10i01.006 fatcat:a4gp2bcqmvbyhcfuimcaugjje4

Concurrency Control Monitor for Nested Transactions based on Autonomous Agents

J. Martínez, M. Alvarado
2005 Inteligencia Artificial  
In this paper, an atomic commit protocol for nested transactions over mobile devices combined with a concurrency control mechanism is introduced.  ...  The monitor features a flexible and goal persistent technique dealing with the loss of communication -a latent risk in mobile environments-, whilst safekeeping the transaction ACID properties.  ...  The lock manager -at the monitor workflow layerimproves the concurrency control in shared access over data-objects.  ... 
doi:10.4114/ia.v9i25.767 fatcat:zlut7acyvfgu3imdagxmhrf7vm

C3: Concurrency control on continuous queries over moving objects

Jing Dai, Chang-Tien Lu
2010 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)  
Existing concurrency control protocols for spatial indices are based on a single indexing tree, while popular continuous query processing approaches require multiple indices.  ...  In addition, continuous monitoring combined with frequent location updates challenges the development of serializable isolation for concurrent index operations.  ...  In other words, TD and VD are both advanced approach for concurrent continuous query processing, which can achieve the same performance as C3 in single-user environments.  ... 
doi:10.1109/icde.2010.5447854 dblp:conf/icde/DaiL10 fatcat:vu2h6w4l45dtvjnervy2dwsppu

A two-part multi-algorithm concurrency control optimization strategy for distributed database systems

Nasser Shebka, Department of Computer Science, Northern Border University, Arar, Saudi Arabia, Computer Science College, Al Neelian University, Khartoum, Sudan
2022 International Journal of Advanced and Applied Sciences  
Although our proposed strategy remains an algorithmic approach as we encountered various challenges regarding performance testing of a novel multi-algorithm approach for handling concurrency control in  ...  Here we proposed a two-part holistic strategy to optimize concurrency control in distributed environments that address a wide range of concurrency control anomalies by taking advantage of several concurrency  ...  A lock-free strategy for managing concurrency control in mobile environments through combining features of timestamp ordering and OCC strategies aiming at minimizing transaction abortion rate and response  ... 
doi:10.21833/ijaas.2022.07.016 fatcat:efsvdotfszdxvkx55xg7lao6ym

Jironde: A Flexible Framework for Making Components Transactional [chapter]

Marek Prochazka
2003 Lecture Notes in Computer Science  
We discuss the influence of both approaches to concurrency control, recovery, and transaction context propagation.  ...  Then, we introduce our approach based on the use of several component controllers that manage transactional functionality on behalf of components.  ...  For instance, concurrency control in CORBA can be managed through a simple read/write locking as specified in the Concurrency Service [12] .  ... 
doi:10.1007/978-3-540-40010-3_9 fatcat:7gpvklmjwzgjxnuyzui5pgjhrq

A Survey of Mobile Transactions

Patricia Serrano-Alvarado, Claudia Roncancio, Michel Adiba
2004 Distributed and parallel databases  
Transaction support is crucial in mobile data management.  ...  Specific characteristics of mobile environments (e.g. variable bandwidth, disconnections, limited resources on mobile hosts) make traditional transaction management techniques no longer appropriate.  ...  Raffin for their help in reading this paper. We wish to thank the members of the NODS project (http://www-45 for their feedbacks all along this research.  ... 
doi:10.1023/b:dapd.0000028552.69032.f9 fatcat:tohlptorcrbsxkgizqcnilsj6a

Concurrency control in mobile distributed real-time database systems

Kam-Yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C.K Law
2000 Information Systems  
similarity for concurrency control in MDRTDBS.  ...   With the rapid advances in mobile computing technology, there is an increasing demand for processing realtime transactions in a mobile environment.  ...  ACKNOWLEDGEMENTS The work reported in this paper was supported in part by research grants NSC87-2213-E194-002 of Taiwan National Science Council, the Hong Kong RGC CERG 9040353, Strategic Grants 700584  ... 
doi:10.1016/s0306-4379(00)00018-1 fatcat:vbewsqhzhzholenwr2sjwfysde


Gabriel Bariyira Christopher, Kabari Ledisi G.
2020 International journal of computer science and mobile computing  
Concurrency control has been actively investigated for the past several years and two-phase locking used as a standard solution for transaction processing in a database management system but the system  ...  This technique will enhance the performance of the concurrency control techniques for transaction processing in a distributed database management system.  ...  Concurrency control is an act of coordinating concurrent accesses to a database in a multi-user Database Management System (DBMS).  ... 
doi:10.47760/ijcsmc.2020.v09i09.012 fatcat:tgxxal5sg5e4hl3er7u4zqs6ye

A Strategy to prioritize the waiting transactions to achieve Concurrency Control in Mobile Environments

Salman Abdul Moiz
2018 International Journal for Research in Applied Science and Engineering Technology  
The inherent features of mobile environments makes concurrency control in mobile environments a challenging problem.  ...  Pessimistic concurrency control mechanisms may not be suitable in mobile database environments as the wireless devices are prone to disconnections and mobility.  ...  DHP-2PL [3] is a locking protocol based on high priority two phase locking to achieve concurrency control in mobile environments.  ... 
doi:10.22214/ijraset.2018.1060 fatcat:b3atxmeg4rczraufmk5zws3itu

Transaction processing in mobile, heterogeneous database systems

J.B. Lim, A.R. Hurson
2002 IEEE Transactions on Knowledge and Data Engineering  
In a mobile computing environment, a potentially large number of users may simultaneously access the global data; therefore, there is a need to provide a means to allow concurrent management of transactions  ...  The proposed concurrency control algorithm-v-lock-uses global locking tables created with semantic information contained within the hierarchy.  ...  ACKNOWLEDGMENTS This work in part has been supported by the US Office of Naval Research under the contract N00014-02-1-0282.  ... 
doi:10.1109/tkde.2002.1047771 fatcat:gt2xwbvvqrf7rj2xggysesxsza

Establishing Multi-level Security in Mobile Data Access

Muhammad Mukaram Khan, Constantinos Papadopoulos
2007 The Open Information Systems Journal  
Based on the discovery of certain vulnerabilities in these protocols, we propose an optional multi-granularity locking protocol that ensures secure access to shared data in mobile environments without  ...  In this paper, we first investigate to what degree this breach may occur and we also assess the suitability of existing protocols for avoiding the appearance of covert channels in mobile database access  ...  In that section we also consider certain aspects of database security which depend on locking mechanisms and concurrency control.  ... 
doi:10.2174/1874133900701010019 fatcat:hbvuvy2bmzfojg5ionsc6xmfze
« Previous Showing results 1 — 15 out of 19,110 results