Show simple item record

Flexible Transaction Dependencies in Database Systems

dc.contributor.authorMancini, Luigi V.en_US
dc.contributor.authorRay, Indrajiten_US
dc.contributor.authorJajodia, Sushilen_US
dc.contributor.authorBertino, Elisaen_US
dc.date.accessioned2006-09-11T15:19:44Z
dc.date.available2006-09-11T15:19:44Z
dc.date.issued2000-10en_US
dc.identifier.citationMancini, Luigi V.; Ray, Indrajit; Jajodia, Sushil; Bertino, Elisa; (2000). "Flexible Transaction Dependencies in Database Systems." Distributed and Parallel Databases 8(4): 399-446. <http://hdl.handle.net/2027.42/44828>en_US
dc.identifier.issn0926-8782en_US
dc.identifier.issn1573-7578en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/44828
dc.description.abstractNumerous extended transaction models have been proposed in the literature to overcome the limitations of the traditional transaction model for advanced applications characterized by their long durations, cooperation between activities and access to multiple databases (like CAD/CAM and office automation). However, most of these extended models have been proposed with specific applications in mind and almost always fail to support applications with slightly different requirements.en_US
dc.format.extent307919 bytes
dc.format.extent3115 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.language.isoen_US
dc.publisherKluwer Academic Publishers; Springer Science+Business Mediaen_US
dc.subject.otherComputer Scienceen_US
dc.subject.otherProcessor Architecturesen_US
dc.subject.otherComputer Communication Networksen_US
dc.subject.otherData Structures, Cryptology and Information Theoryen_US
dc.subject.otherInformation Storage and Retrievalen_US
dc.subject.otherDatabase Management Systemsen_US
dc.subject.otherTransaction Processingen_US
dc.subject.otherTransaction Dependenciesen_US
dc.subject.otherCommit Protocolsen_US
dc.subject.otherDistributed Systemsen_US
dc.subject.otherMultilevel Securityen_US
dc.titleFlexible Transaction Dependencies in Database Systemsen_US
dc.typeArticleen_US
dc.subject.hlbsecondlevelPhilosophyen_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.subject.hlbtoplevelHumanitiesen_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumDepartment of Computer and Information Science, University of Michigan-Dearborn, Dearborn, MI, 48128, USAen_US
dc.contributor.affiliationotherDipartimento di Scienze dell'Informazione, Università di Roma “La Sapienza”, Rome, Italyen_US
dc.contributor.affiliationotherDepartment of Information and Software Engineering, George Mason University, Fairfax, VA, 22030-4444, USAen_US
dc.contributor.affiliationotherDipartimento di Scienze dell'Informazione, Università di Milano, Milano, Italyen_US
dc.contributor.affiliationumcampusDearbornen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/44828/1/10619_2004_Article_270346.pdfen_US
dc.identifier.doihttp://dx.doi.org/10.1023/A:1008738705440en_US
dc.identifier.sourceDistributed and Parallel Databasesen_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.