Concurrency Control and Recovery in Database Systems
by P. A. Bernstein, V. Hadzilacos, N. Goodman
Publisher: Addison Wesley 1987
ISBN/ASIN: 0201107155
ISBN-13: 9780201107159
Number of pages: 58
Description:
This book is about techniques for concurrency control and recovery. It covers techniques for centralized and distributed computer systems, and for single copy, multiversion, and replicated databases. These techniques were developed by researchers and system designers principally interested in transaction processing systems and database systems. Such systems must process a relatively high volume of short transactions for data processing. Example applications include electronic funds transfer, airline reservation, and order processing. The techniques are useful for other types of applications too, such as electronic switching and computer-aided design - indeed any application that requires atomicity and reliability of concurrently executing programs that access shared data.
Download or read it online for free here:
Download link
(3.3MB, PDF)
Similar books
Elements of Relational Database Theoryby Paris C. Kanellakis - Brown University Providence
The goal of this paper is to provide a systematic and unifying introduction to relational database theory, including some of the recent developments in database logic programming. The exposition closes with the problems of complex objects...
(10460 views)
Temporal Database Managementby Christian S. Jensen - Aalborg University
Topics covered: the semantics of temporal data, the design of data models and languages for temporal data, the design of databases expressed in terms of temporal data models as well as temporally enhanced design of conventional databases.
(9555 views)
An Introduction to Data Miningby Saed Sayad - University of Toronto
Data Mining is about explaining the past and predicting the future by means of data analysis. Data mining is a multidisciplinary field which combines statistics, machine learning, artificial intelligence and database technology.
(19942 views)
Forensic Analysis of Database Tamperingby Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(23179 views)