Logo

Concurrency Control and Recovery in Database Systems

Large book cover: Concurrency Control and Recovery in Database Systems

Concurrency Control and Recovery in Database Systems
by

Publisher: Addison Wesley
ISBN/ASIN: 0201107155
ISBN-13: 9780201107159
Number of pages: 58

Description:
This book is about techniques for concurrency control and recovery. It covers techniques for centralized and distributed computer systems, and for single copy, multiversion, and replicated databases. These techniques were developed by researchers and system designers principally interested in transaction processing systems and database systems. Such systems must process a relatively high volume of short transactions for data processing. Example applications include electronic funds transfer, airline reservation, and order processing. The techniques are useful for other types of applications too, such as electronic switching and computer-aided design - indeed any application that requires atomicity and reliability of concurrently executing programs that access shared data.

Home page url

Download or read it online for free here:
Download link
(3.3MB, PDF)

Similar books

Book cover: Readings in Database SystemsReadings in Database Systems
by - UC Berkeley
These lecture notes provide students and professionals with a grounding in database research and a technical context for understanding recent innovations in the field. The readings included treat the most important issues in the database area.
(18427 views)
Book cover: XML and DatabasesXML and Databases
by
This paper gives a high-level overview of how to use XML with databases. It describes how the differences between data-centric and document-centric documents affect their usage with databases and how XML is commonly used with relational databases.
(19729 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21418 views)
Book cover: Data Modeling Techniques for Data WarehousingData Modeling Techniques for Data Warehousing
by - IBM Redbooks
It covers data modeling techniques for data warehousing, within the context of the overall data warehouse development process. The process of data warehouse modeling, including the steps required before and after the actual modeling, is discussed.
(22596 views)