Academic literature on the topic 'Database transaction'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Database transaction.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Database transaction"

1

Kaur, Harpreet, Mritunjay Kumar, and Gulshan Kumar. "Performance evaluation of conflict serializability against 2PL in Homogenous Distributed Database." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 7, no. 1 (2013): 510–17. http://dx.doi.org/10.24297/ijct.v7i1.3481.

Full text
Abstract:
There are many techniques in the recent years that provide the synchronization among the transactions using shared data like 2 phase locking protocol and time stamping in distributed database system. These techniques are efficient and provide fast transactional operations and serializable execution of the transactions. But these existing techniques like 2PL abort the transaction when a conflict occurs in transaction actions that result in degradation in the performance. In this dissertation we analyse the purposed techniques that provide the serial execution of the concurrent transactions. To
APA, Harvard, Vancouver, ISO, and other styles
2

Mohamed, Asghaiyer. "Network load traffic on MySQL atomic transaction database." Bulletin of Social Informatics Theory and Application 4, no. 1 (2020): 35–39. http://dx.doi.org/10.31763/businta.v4i1.188.

Full text
Abstract:
Internet technology is developing very rapidly especially on the database system. Today's database has led to data that cannot be processed into the traditional way that we call big data. Some data stored on the server requires a way for the data to be valid and intact for that transaction mechanism appears on RDBMS which ensures that the data stored will become a unified whole as in customer account data, withdrawal of money at ATMs, e-transactions -commerce and so on.
 Of course the use of transactions in a database by not using Atomic transactions has a difference in terms of traffic o
APA, Harvard, Vancouver, ISO, and other styles
3

Khanuja, Harmeet Kaur, and Dattatraya Adane. "Monitor and Detect Suspicious Transactions With Database Forensic Analysis." Journal of Database Management 29, no. 4 (2018): 28–50. http://dx.doi.org/10.4018/jdm.2018100102.

Full text
Abstract:
The extensive usage of web has given rise to financially motivated illegal covert online transactions. So the digital investigators have approached databases for investigating undetected illegal transactions. The authors here have designed and developed a methodology to find the illegal financial transactions through the database logs. The objective is to monitor database transactions for detecting and reporting risk level of suspicious transactions. Initially, the process extracts SQL transactions from logs of different database systems, then transforms and loads them separately in uniform XM
APA, Harvard, Vancouver, ISO, and other styles
4

Jain, Ashish. "Transaction Processing in Mobile Database Systems." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 7, no. 02 (2015): 87–92. http://dx.doi.org/10.18090/samriddhi.v7i2.8631.

Full text
Abstract:
In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore, there is a need to provide a means to allow concurrent management of transactions. Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate. This is due the fact that the ACID properties of transactions are not simply followed, in particular the consistency property. Thus, transaction management models adopting weaker form of consistency are needed and these models can now tolerate a limited amo
APA, Harvard, Vancouver, ISO, and other styles
5

RUSINKIEWICZ, MAREK, PIOTR KRYCHNIAK, and ANDRZEJ CICHOCKI. "TOWARDS A MODEL FOR MULTIDATABASE TRANSACTIONS." International Journal of Cooperative Information Systems 01, no. 03n04 (1992): 579–617. http://dx.doi.org/10.1142/s0218215792000155.

Full text
Abstract:
In many application areas the information that may be of interest to a user is stored under the control of multiple, autonomous database systems. To support global transactions in a multidatabase environment, we must coordinate the activities of multiple Database Management Systems that were designed for independent, stand-alone operation. The autonomy and heterogeneity of these systems present a major impediment to the direct adaptation of transaction management mechanisms developed for distributed databases. In this paper we introduce a transaction model designed for a multidatabase environm
APA, Harvard, Vancouver, ISO, and other styles
6

Warnars, Spits. "Perbandingan Penggunaan Database OLTP dan Data Warehouse." CCIT Journal 8, no. 1 (2014): 83–100. http://dx.doi.org/10.33050/ccit.v8i1.274.

Full text
Abstract:
As a permanent storage for business process transaction, database is a crucial and the needed for the system. Using database often does not match with the ability and functionality and even is it possible as theory said about using transaction database and beyond the advantages and disadvantages, separating using between transactional database and database for decision making will mine the ability and the powerful database as much as possible. Beside that daily transaction will increase the database capacity month by month and year by year and will decrease the performance, especially for cust
APA, Harvard, Vancouver, ISO, and other styles
7

Haraty, Ramzi Ahmed, Sanaa Kaddoura, and Ahmed Zekri. "Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 74–86. http://dx.doi.org/10.4018/ijswis.2017040105.

Full text
Abstract:
One of the critical concerns in the current era is information security. Companies are sharing vast online critical data, which exposes their databases to malicious attacks. When protection techniques fail to prevent an attack, recovery is needed. Database recovery is not a straightforward procedure, since the transactions are highly interconnected. Traditional recovery techniques do not consider the interconnection between transactions because this information is not saved anywhere in the log file. Thus, they rollback all the transactions starting from the detected malicious transaction to th
APA, Harvard, Vancouver, ISO, and other styles
8

Jing, Changhong, Wenjie Liu, Jintao Gao, and Ouya Pei. "Research and implementation of HTAP for distributed database." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 39, no. 2 (2021): 430–38. http://dx.doi.org/10.1051/jnwpu/20213920430.

Full text
Abstract:
Data processing can be roughly divided into two categories, online transaction processing OLTP(on-line transaction processing) and online analytical processing OLAP(on-line analytical processing). OLTP is the main application of traditional relational databases, and it is some basic daily transaction processing, such as bank pipeline transactions and so on. OLAP is the main application of the data warehouse system, it supports some more complex data analysis operations, focuses on decision support, and provides popular and intuitive analysis results. As the amount of data processed by enterpri
APA, Harvard, Vancouver, ISO, and other styles
9

Pei, Ouya, Zhanhuai Li, Hongtao Du, Wenjie Liu, and Jintao Gao. "Dependence-Cognizant Locking Improvement for the Main Memory Database Systems." Mathematical Problems in Engineering 2021 (February 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/6654461.

Full text
Abstract:
The traditional lock manager (LM) seriously limits the transaction throughput of the main memory database systems (MMDB). In this paper, we introduce dependence-cognizant locking (DCLP), an efficient improvement to the traditional LM, which dramatically reduces the locking space while offering efficiency. With DCLP, one transaction and its direct successors are collocated in its context. Whenever a transaction is committed, it wakes up its direct successors immediately avoiding the expensive operations, such as lock detection and latch contention. We also propose virtual transaction which has
APA, Harvard, Vancouver, ISO, and other styles
10

Sianturi, Fricles Ariwisanto. "ANALISA PENGARUH LOG TRANSAKSI PADA SISTEM KOMPUTER MENGGUNAKAN ALGORITMA RECOVERY BERBASIS LOG." Journal Of Computer Networks, Architecture and High Performance Computing 1, no. 1 (2018): 6–9. http://dx.doi.org/10.47709/cnapc.v1i1.2.

Full text
Abstract:
This study aims to melakukakan analysis of the effect of the transaction log on a computer based system either on a single system tired, and two tiered through simulated transactions bank system with technology client / server to get a log of transactions on the database system Microsoft Windows SQL Server 2008 R2 management studio a data base. Methods or algorithms are used to analyze the transaction log on the system used is a log-based recovery algorithm.The results based on the analysis, showed that the use of query local database and query the database using sotere procedure to get the tr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Database transaction"

1

Burger, Albert G. "Branching transactions : a transaction model for parallel database systems." Thesis, University of Edinburgh, 1996. http://hdl.handle.net/1842/15591.

Full text
Abstract:
In order to exploit parallel computers, database management systems must achieve a high level of concurrency when executing transactions. In a high contention environment, however, concurrency is severely limited due to transaction blocking, and the utilisation of parallel hardware resources, e.g. multiple CPUs, can be low. In this dissertation, a new transaction model, <I>Branching Transactions, </I>is proposed. Under branching transactions, more than one possible path of execution of a transaction is followed up in parallel, which allows us to avoid unnecessary transaction blockings and rest
APA, Harvard, Vancouver, ISO, and other styles
2

Aleksic, Mario. "Incremental computation methods in valid and transaction time databases." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dias, Ricardo Jorge Freire. "Cooperative memory and database transactions." Master's thesis, Faculdade de Ciências e Tecnologia, 2008. http://hdl.handle.net/10362/4192.

Full text
Abstract:
Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para a obtenção do Grau de Mestre em Engenharia Informática<br>Since the introduction of Software Transactional Memory (STM), this topic has received a strong interest by the scientific community, as it has the potential of greatly facilitating concurrent programming by hiding many of the concurrency issues under the transactional layer, being in this way a potential alternative to the lock based constructs, such as mutexes and semaphores. The current practice of STM is based on keeping track of
APA, Harvard, Vancouver, ISO, and other styles
4

Prabhu, Nitin Kumar Vijay. "Transaction processing in Mobile Database System." Diss., UMK access, 2006.

Find full text
Abstract:
Thesis (Ph. D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2006.<br>"A dissertation in computer science and informatics and telecommunications and computer networking." Advisor: Vijay Kumar. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 9, 2007. Includes bibliographical references (leaves 152-157). Online version of the print edition.
APA, Harvard, Vancouver, ISO, and other styles
5

Lawley, Michael John, and n/a. "Program Transformation for Proving Database Transaction Safety." Griffith University. School of Computing and Information Technology, 2000. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070228.150125.

Full text
Abstract:
In this thesis we propose the use of Dijkstra's concept of a predicate transformer [Dij75] for the determination of database transaction safety [SS89] and the generation of simple conditions to check that a transaction will not violate the integrity constraints in the case that it is not safe. The generation of this simple condition is something that can be done statically, thus providing a mechanism for generating safe transactions. Our approach treats a database as state, a database transaction as a program, and the database's integrity constraints as a postcondition in order to use a predic
APA, Harvard, Vancouver, ISO, and other styles
6

Tuck, Terry W. "Temporally Correct Algorithms for Transaction Concurrency Control in Distributed Databases." Thesis, University of North Texas, 2001. https://digital.library.unt.edu/ark:/67531/metadc2743/.

Full text
Abstract:
Many activities are comprised of temporally dependent events that must be executed in a specific chronological order. Supportive software applications must preserve these temporal dependencies. Whenever the processing of this type of an application includes transactions submitted to a database that is shared with other such applications, the transaction concurrency control mechanisms within the database must also preserve the temporal dependencies. A basis for preserving temporal dependencies is established by using (within the applications and databases) real-time timestamps to identify and o
APA, Harvard, Vancouver, ISO, and other styles
7

Sauer, Caetano [Verfasser]. "Modern techniques for transaction-oriented database recovery / Caetano Sauer." München : Verlag Dr. Hut, 2017. http://d-nb.info/1140977644/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Youssef, Mohamed Wagdy Abdel Fattah. "Transaction behaviour in large database environments : a methodological approach." Thesis, City University London, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.358945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Xiangyang. "The development of a knowledge-based database transaction design assistant." Thesis, Cardiff University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.359755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mena, Eduardo Illarramendi Arantza. "Ontology-based query processing for global information systems /." Boston [u.a.] : Kluwer Acad. Publ, 2001. http://www.loc.gov/catdir/enhancements/fy0813/2001029621-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Database transaction"

1

Veijalainen, Jari. Transaction concepts in autonomous database environments. R. Oldenbourg, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Soparkar, Nandit R. Time-constrained transaction management: Real-time constraints in database transaction systems. Kluwer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soparkar, Nandit R. Time-Constrained Transaction Management: Real-Time Constraints in Database Transaction Systems. Springer US, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McManus, Thomas E. Telephone transaction-generated information: Rights and restrictions. Program on Information Resources Policy, Harvard University, Center for Information Policy Research, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kifer, M. Database systems: An application-oriented approach. 2nd ed. Pearson/Addison Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Atluri, Vijay. Multilevel secure transaction processing. Kluwer Academic, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhalla, Subhash. Implementing message oriented transaction processing for distributed database management systems. Sloan School of Management, Massachusetts Institute of Technology, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vossen, Gottfried. Transaktionsverarbeitung in Datenbanksystemen unter Ausnutzung semantischer Information. Hüthig, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gottfried, Vossen, ed. Transactional information systems: Theory, algorithms, and the practice of concurrency control and recovery. Morgan Kaufmann, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

J, Bernstein Arthur, and Kifer M. 1954-, eds. Databases and transaction processing: An application-oriented approach. Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Database transaction"

1

Beynon-Davies, Paul. "Transaction Management." In Database Systems. Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-0-230-00107-7_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vossen, Gottfried. "Transaction." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vossen, Gottfried. "Transaction." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vossen, Gottfried. "Transaction." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_436-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vossen, Gottfried. "Database transaction models." In Computer Science Today. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0015267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jensen, Christian S., and Richard T. Snodgrass. "Transaction Time." In Encyclopedia of Database Systems. Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_1064-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jensen, Christian S., and Richard T. Snodgrass. "Transaction Time." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shasha, Dennis. "Transaction Chopping." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Reuter, Andreas. "Transaction Manager." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vossen, Gottfried. "Transaction Management." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_835.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Database transaction"

1

Gray, Jim. "Database and transaction processing benchmarks." In the 1992 ACM SIGMOD international conference. ACM Press, 1992. http://dx.doi.org/10.1145/130283.130288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ibrahim, Romani Farid. "Handling disconnection in mobile database transaction." In 2011 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2011. http://dx.doi.org/10.1109/icaict.2011.6111015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kvet, Michal, Karol Matiasko, and Monika Vajsova. "Sensor based transaction temporal database architecture." In 2015 IEEE World Conference on Factory Communication Systems (WFCS). IEEE, 2015. http://dx.doi.org/10.1109/wfcs.2015.7160547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Acharya, Shridhar, and Gael Buckley. "Transaction restarts in Prolog database systems." In the 1985 ACM SIGMOD international conference. ACM Press, 1985. http://dx.doi.org/10.1145/318898.318986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Qian, Xiaolei, and Richard Waldinger. "A transaction logic for database specification." In the 1988 ACM SIGMOD international conference. ACM Press, 1988. http://dx.doi.org/10.1145/50202.50232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, John A. "Simulation of database transaction management protocols." In the 24th conference. ACM Press, 1992. http://dx.doi.org/10.1145/167293.167905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nascimento, Mario A., and Margaret H. Dunham. "Indexing a transaction-decision time database." In the 1996 ACM symposium. ACM Press, 1996. http://dx.doi.org/10.1145/331119.331169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rathod, Y. A., M. B. Chaudhari, and G. B. Jethava. "Database intrusion detection by transaction signature." In 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT 2012). IEEE, 2012. http://dx.doi.org/10.1109/icccnt.2012.6395997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mokhtar, Hoda M. O., and Nariman Adel. "Transaction processing using thread-to-metadata." In the 16th International Database Engineering & Applications Sysmposium. ACM Press, 2012. http://dx.doi.org/10.1145/2351476.2351505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Damoah, Dominic, James B. Hayfron-Acquah, Shamo Sebastian, Edward Ansong, Brighter Agyemang, and Roy Villafane. "Transaction recovery in federated distributed database systems." In 2014 International Conference on Computer Communication & Systems (ICCCS). IEEE, 2014. http://dx.doi.org/10.1109/icccs.2014.7068178.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Database transaction"

1

Kang, Myong H., Oliver Costich, and Judith N. Froscher. A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada462360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Costich, Oliver, and Sushil Jajodia. Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada465420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Costich, Oliver. Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada462366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Costich, Oliver, and John McDermott. A Multilevel Transaction Problem for Multilevel Secure Database Systems and its Solution for the Replicated Architecture. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada462530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tolan, Gil D. Transaction Design Specification Medical Exam Databases System (MED) update Transaction. Defense Technical Information Center, 1986. http://dx.doi.org/10.21236/ada271597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!