Academic literature on the topic 'Transactional databases'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transactional databases.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Transactional databases"
Fouad, Mohammed M., Mostafa G. M. Mostafa, Abdulfattah S. Mashat, and Tarek F. Gharib. "IMIDB: An Algorithm for Indexed Mining of Incremental Databases." Journal of Intelligent Systems 26, no. 1 (January 1, 2017): 69–85. http://dx.doi.org/10.1515/jisys-2015-0107.
Full textSzafrański, Bolesław, and Rafał Bałazy. "Data protection in transactional and statistical applications of databases." Computer Science and Mathematical Modelling, no. 10/2019 (September 30, 2020): 31–39. http://dx.doi.org/10.5604/01.3001.0014.4439.
Full textAL-Khafaji, Hussein, and Noora Al-Saidi. "DWORM: A Novel Algorithm To Maintain Large Itemsets in Deleted Items and/or Transactions Databases Without Re-Mining." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 1 (October 23, 2021): 5–24. http://dx.doi.org/10.55562/jrucs.v26i1.418.
Full textChen, Hongzhi, Changji Li, Chenguang Zheng, Chenghuan Huang, Juncheng Fang, James Cheng, and Jian Zhang. "G-tran." Proceedings of the VLDB Endowment 15, no. 11 (July 2022): 2545–58. http://dx.doi.org/10.14778/3551793.3551813.
Full textMazurova, Oksana, Artem Naboka, and Mariya Shirokopetleva. "RESEARCH OF ACID TRANSACTION IMPLEMENTATION METHODS FOR DISTRIBUTED DATABASES USING REPLICATION TECHNOLOGY." Innovative Technologies and Scientific Solutions for Industries, no. 2 (16) (July 6, 2021): 19–31. http://dx.doi.org/10.30837/itssi.2021.16.019.
Full textVijay Kumar, G., M. Sreedevi, K. Bhargav, and P. Mohan Krishna. "Incremental Mining of Popular Patterns from Transactional Databases." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 636. http://dx.doi.org/10.14419/ijet.v7i2.7.10913.
Full textAvni, Hillel, and Trevor Brown. "Persistent hybrid transactional memory for databases." Proceedings of the VLDB Endowment 10, no. 4 (November 2016): 409–20. http://dx.doi.org/10.14778/3025111.3025122.
Full textXiang, Yang, Ruoming Jin, David Fuhry, and Feodor F. Dragan. "Summarizing transactional databases with overlapped hyperrectangles." Data Mining and Knowledge Discovery 23, no. 2 (October 24, 2010): 215–51. http://dx.doi.org/10.1007/s10618-010-0203-9.
Full textGowtham Srinivas, P., P. Krishna Reddy, A. V. Trinath, S. Bhargav, and R. Uday Kiran. "Mining coverage patterns from transactional databases." Journal of Intelligent Information Systems 45, no. 3 (May 30, 2014): 423–39. http://dx.doi.org/10.1007/s10844-014-0318-3.
Full textGKOULALAS-DIVANIS, ARIS, and VASSILIOS S. VERYKIOS. "EXACT KNOWLEDGE HIDING IN TRANSACTIONAL DATABASES." International Journal on Artificial Intelligence Tools 18, no. 01 (February 2009): 17–37. http://dx.doi.org/10.1142/s0218213009000020.
Full textDissertations / Theses on the topic "Transactional databases"
Navarro, Martín Joan. "From cluster databases to cloud storage: Providing transactional support on the cloud." Doctoral thesis, Universitat Ramon Llull, 2015. http://hdl.handle.net/10803/285655.
Full textDurante las últimas tres décadas, las limitaciones tecnológicas (por ejemplo la capacidad de los dispositivos de almacenamiento o el ancho de banda de las redes de comunicación) y las crecientes demandas de los usuarios (estructuras de información, volúmenes de datos) han conducido la evolución de las bases de datos distribuidas. Desde los primeros repositorios de datos para archivos planos que se desarrollaron en la década de los ochenta, se han producido importantes avances en los algoritmos de control de concurrencia, protocolos de replicación y en la gestión de transacciones. Sin embargo, los retos modernos de almacenamiento de datos que plantean el Big Data y el cloud computing—orientados a mejorar la limitaciones en cuanto a escalabilidad y elasticidad de las bases de datos estáticas—están empujando a los profesionales a relajar algunas propiedades importantes de los sistemas transaccionales clásicos, lo que excluye a varias aplicaciones las cuales no pueden encajar en esta estrategia debido a su alta dependencia transaccional. El propósito de esta tesis es abordar dos retos importantes todavía latentes en el campo de las bases de datos distribuidas: (1) las limitaciones en cuanto a escalabilidad de los sistemas transaccionales y (2) el soporte transaccional en repositorios de almacenamiento en la nube. Analizar las técnicas tradicionales de control de concurrencia y de replicación, utilizadas por las bases de datos clásicas para soportar transacciones, es fundamental para identificar las razones que hacen que estos sistemas degraden su rendimiento cuando el número de nodos y/o cantidad de datos crece. Además, este análisis está orientado a justificar el diseño de los repositorios en la nube que deliberadamente han dejado de lado el soporte transaccional. Efectivamente, acercar el paradigma del almacenamiento en la nube a las aplicaciones que tienen una fuerte dependencia en las transacciones es crucial para su adaptación a los requerimientos actuales en cuanto a volúmenes de datos y modelos de negocio. Esta tesis empieza con la propuesta de un simulador de protocolos para bases de datos distribuidas estáticas, el cual sirve como base para la revisión y comparativa de rendimiento de los protocolos de control de concurrencia y las técnicas de replicación existentes. En cuanto a la escalabilidad de las bases de datos y las transacciones, se estudian los efectos que tiene ejecutar distintos perfiles de transacción bajo diferentes condiciones. Este análisis continua con una revisión de los repositorios de almacenamiento en la nube existentes—que prometen encajar en entornos dinámicos que requieren alta escalabilidad y disponibilidad—, el cual permite evaluar los parámetros y características que estos sistemas han sacrificado con el fin de cumplir las necesidades actuales en cuanto a almacenamiento de datos a gran escala. Para explorar las posibilidades que ofrece el paradigma del cloud computing en un escenario real, se presenta el desarrollo de una arquitectura de almacenamiento de datos inspirada en el cloud computing para almacenar la información generada en las Smart Grids. Concretamente, se combinan las técnicas de replicación en bases de datos transaccionales y la propagación epidémica con los principios de diseño usados para construir los repositorios de datos en la nube. Las lecciones recogidas en el estudio de los protocolos de replicación y control de concurrencia en el simulador de base de datos, junto con las experiencias derivadas del desarrollo del repositorio de datos para las Smart Grids, desembocan en lo que hemos acuñado como Epidemia: una infraestructura de almacenamiento para Big Data concebida para proporcionar soporte transaccional en la nube. Además de heredar los beneficios de los repositorios en la nube altamente en cuanto a escalabilidad, Epidemia incluye una capa de gestión de transacciones que reenvía las transacciones de los clientes a un conjunto jerárquico de particiones de datos, lo que permite al sistema ofrecer distintos niveles de consistencia y adaptar elásticamente su configuración a nuevas demandas cargas de trabajo. Por último, los resultados experimentales ponen de manifiesto la viabilidad de nuestra contribución y alientan a los profesionales a continuar trabajando en esta área.
Over the past three decades, technology constraints (e.g., capacity of storage devices, communication networks bandwidth) and an ever-increasing set of user demands (e.g., information structures, data volumes) have driven the evolution of distributed databases. Since flat-file data repositories developed in the early eighties, there have been important advances in concurrency control algorithms, replication protocols, and transactions management. However, modern concerns in data storage posed by Big Data and cloud computing—related to overcome the scalability and elasticity limitations of classic databases—are pushing practitioners to relax some important properties featured by transactions, which excludes several applications that are unable to fit in this strategy due to their intrinsic transactional nature. The purpose of this thesis is to address two important challenges still latent in distributed databases: (1) the scalability limitations of transactional databases and (2) providing transactional support on cloud-based storage repositories. Analyzing the traditional concurrency control and replication techniques, used by classic databases to support transactions, is critical to identify the reasons that make these systems degrade their throughput when the number of nodes and/or amount of data rockets. Besides, this analysis is devoted to justify the design rationale behind cloud repositories in which transactions have been generally neglected. Furthermore, enabling applications which are strongly dependent on transactions to take advantage of the cloud storage paradigm is crucial for their adaptation to current data demands and business models. This dissertation starts by proposing a custom protocol simulator for static distributed databases, which serves as a basis for revising and comparing the performance of existing concurrency control protocols and replication techniques. As this thesis is especially concerned with transactions, the effects on the database scalability of different transaction profiles under different conditions are studied. This analysis is followed by a review of existing cloud storage repositories—that claim to be highly dynamic, scalable, and available—, which leads to an evaluation of the parameters and features that these systems have sacrificed in order to meet current large-scale data storage demands. To further explore the possibilities of the cloud computing paradigm in a real-world scenario, a cloud-inspired approach to store data from Smart Grids is presented. More specifically, the proposed architecture combines classic database replication techniques and epidemic updates propagation with the design principles of cloud-based storage. The key insights collected when prototyping the replication and concurrency control protocols at the database simulator, together with the experiences derived from building a large-scale storage repository for Smart Grids, are wrapped up into what we have coined as Epidemia: a storage infrastructure conceived to provide transactional support on the cloud. In addition to inheriting the benefits of highly-scalable cloud repositories, Epidemia includes a transaction management layer that forwards client transactions to a hierarchical set of data partitions, which allows the system to offer different consistency levels and elastically adapt its configuration to incoming workloads. Finally, experimental results highlight the feasibility of our contribution and encourage practitioners to further research in this area.
Araujo, Neto Afonso Comba de. "Security Benchmarking of Transactional Systems." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2012. http://hdl.handle.net/10183/143292.
Full textMost organizations nowadays depend on some kind of computer infrastructure to manage business critical activities. This dependence grows as computer systems become more reliable and useful, but so does the complexity and size of systems. Transactional systems, which are database-centered applications used by most organizations to support daily tasks, are no exception. A typical solution to cope with systems complexity is to delegate the software development task, and to use existing solutions independently developed and maintained (either proprietary or open source). The multiplicity of software and component alternatives available has boosted the interest in suitable benchmarks, able to assist in the selection of the best candidate solutions, concerning several attributes. However, the huge success of performance and dependability benchmarking markedly contrasts with the small advances on security benchmarking, which has only sparsely been studied in the past. his thesis discusses the security benchmarking problem and main characteristics, particularly comparing these with other successful benchmarking initiatives, like performance and dependability benchmarking. Based on this analysis, a general framework for security benchmarking is proposed. This framework, suitable for most types of software systems and application domains, includes two main phases: security qualification and trustworthiness benchmarking. Security qualification is a process designed to evaluate the most obvious and identifiable security aspects of the system, dividing the evaluated targets in acceptable or unacceptable, given the specific security requirements of the application domain. Trustworthiness benchmarking, on the other hand, consists of an evaluation process that is applied over the qualified targets to estimate the probability of the existence of hidden or hard to detect security issues in a system (the main goal is to cope with the uncertainties related to security aspects). The framework is thoroughly demonstrated and evaluated in the context of transactional systems, which can be divided in two parts: the infrastructure and the business applications. As these parts have significantly different security goals, the framework is used to develop methodologies and approaches that fit their specific characteristics. First, the thesis proposes a security benchmark for transactional systems infrastructures and describes, discusses and justifies all the steps of the process. The benchmark is applied to four distinct real infrastructures, and the results of the assessment are thoroughly analyzed. Still in the context of transactional systems infrastructures, the thesis also addresses the problem of the selecting software components. This is complex as evaluating the security of an infrastructure cannot be done before deployment. The proposed tool, aimed at helping in the selection of basic software packages to support the infrastructure, is used to evaluate seven different software packages, representative alternatives for the deployment of real infrastructures. Finally, the thesis discusses the problem of designing trustworthiness benchmarks for business applications, focusing specifically on the case of web applications. First, a benchmarking approach based on static code analysis tools is proposed. Several experiments are presented to evaluate the effectiveness of the proposed metrics, including a representative experiment where the challenge was the selection of the most secure application among a set of seven web forums. Based on the analysis of the limitations of such approach, a generic approach for the definition of trustworthiness benchmarks for web applications is defined.
Li, Yanrong. "Techniques for improving clustering and association rules mining from very large transactional databases." Thesis, Curtin University, 2009. http://hdl.handle.net/20.500.11937/907.
Full textLiu, Yufan. "A Survey Of Persistent Graph Databases." Kent State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=kent1395166105.
Full textNiles, Duane Francis Jr. "Improving Performance of Highly-Programmable Concurrent Applications by Leveraging Parallel Nesting and Weaker Isolation Levels." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54557.
Full textMaster of Science
Bejaoui, Lofti. "Qualitative topological relationships for objects with possibly vague shapes: implications on the specification of topological integrity constraints in transactional spatial databases and in spatial data warehouses." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2009. http://tel.archives-ouvertes.fr/tel-00725614.
Full textBejaoui, Lotfi. "Qualitative Topological Relationships for Objects with Possibly Vague Shapes: Implications on the Specification of Topological Integrity Constraints in Transactional Spatial Databases and in Spatial Data Warehouses." Thesis, Université Laval, 2009. http://www.theses.ulaval.ca/2009/26348/26348.pdf.
Full textBurger, Albert G. "Branching transactions : a transaction model for parallel database systems." Thesis, University of Edinburgh, 1996. http://hdl.handle.net/1842/15591.
Full textDias, Ricardo Jorge Freire. "Cooperative memory and database transactions." Master's thesis, Faculdade de Ciências e Tecnologia, 2008. http://hdl.handle.net/10362/4192.
Full textSince the introduction of Software Transactional Memory (STM), this topic has received a strong interest by the scientific community, as it has the potential of greatly facilitating concurrent programming by hiding many of the concurrency issues under the transactional layer, being in this way a potential alternative to the lock based constructs, such as mutexes and semaphores. The current practice of STM is based on keeping track of changes made to the memory and, if needed, restoring previous states in case of transaction rollbacks. The operations in a program that can be reversible,by restoring the memory state, are called transactional operations. The way that this reversibility necessary to transactional operations is achieved is implementation dependent on the STM libraries being used. Operations that cannot be reversed,such as I/O to external data repositories (e.g., disks) or to the console, are called nontransactional operations. Non-transactional operations are usually disallowed inside a memory transaction, because if the transaction aborts their effects cannot be undone. In transactional databases, operations like inserting, removing or transforming data in the database can be undone if executed in the context of a transaction. Since database I/O operations can be reversed, it should be possible to execute those operations in the context of a memory transaction. To achieve such purpose, a new transactional model unifying memory and database transactions into a single one was defined, implemented, and evaluated. This new transactional model satisfies the properties from both the memory and database transactional models. Programmers can now execute memory and database operations in the same transaction and in case of a transaction rollback, the transaction effects in both the memory and the database are reverted.
Aleksic, Mario. "Incremental computation methods in valid and transaction time databases." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8126.
Full textBooks on the topic "Transactional databases"
N, Chorafas Dimitris. Transaction management: Managing complex transactions and sharing distributed databases. New York, N.Y: St. Martin's Press, 1998.
Find full textZawis, John A. Accessing hierarchical databases via SQL transactions in a multi-model database system. Monterey, Calif: Naval Postgraduate School, 1987.
Find full textWalpole, Dennis A. Accessing network databases via SQL transactions in a multi-model database system. Monterey, Calif: Naval Postgraduate School, 1989.
Find full textMcManus, Thomas E. Telephone transaction-generated information: Rights and restrictions. Cambridge, Mass. (200 Aiken, Cambridge 02138): Program on Information Resources Policy, Harvard University, Center for Information Policy Research, 1990.
Find full textSaake, Gunter, Kerstin Schwarz, and Can Türker, eds. Transactions and Database Dynamics. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-46466-2.
Full textFreitag, Burkhard, Hendrik Decker, Michael Kifer, and Andrei Voronkov, eds. Transactions and Change in Logic Databases. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055493.
Full textKifer, M. Database systems: An application-oriented approach. 2nd ed. Boston: Pearson/Addison Wesley, 2005.
Find full text1960-, Saake Gunter, Schwarz Kerstin, and Türker Can, eds. Transactions and database dynamics: 8th International Workshop on Foundations of Models and Languages for Data and Objects, Dagstuhl Castle, Germany, September 27-30, 1999 : selected papers. Berlin: Springer, 2000.
Find full textSowade, Olajide B. Transaction Management in Object Oriented Distributed Databases. London: University ofEast London, 1995.
Find full textKuhn, Darl, and Thomas Kyte. Oracle Database Transactions and Locking Revealed. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6425-6.
Full textBook chapters on the topic "Transactional databases"
Vossen, Gottfried. "Transactional workflows." In Deductive and Object-Oriented Databases, 20–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63792-3_4.
Full textHaghir Chehreghani, Mostafa, and Morteza Haghir Chehreghani. "Transactional Tree Mining." In Machine Learning and Knowledge Discovery in Databases, 182–98. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46128-1_12.
Full textKempster, Tim, Gordon Brebner, and Peter Thanisch. "A Transactional Approach to Configuring Telecommunications Services." In Databases in Telecommunications, 40–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10721056_4.
Full textLeung, Carson Kai-Sang, and Syed K. Tanbeer. "Mining Popular Patterns from Transactional Databases." In Data Warehousing and Knowledge Discovery, 291–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32584-7_24.
Full textKiran, R. Uday, and Masaru Kitsuregawa. "Discovering Chronic-Frequent Patterns in Transactional Databases." In Databases in Networked Information Systems, 12–26. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16313-0_2.
Full textTanbeer, Syed Khairuzzaman, Chowdhury Farhan Ahmed, Byeong-Soo Jeong, and Young-Koo Lee. "Discovering Periodic-Frequent Patterns in Transactional Databases." In Advances in Knowledge Discovery and Data Mining, 242–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01307-2_24.
Full textBharati, R. D., and V. Z. Attar. "Workload-Driven Transactional Partitioning for Distributed Databases." In Data Intelligence and Cognitive Informatics, 389–96. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8530-2_31.
Full textBharati, R. D., and V. Z. Attar. "Workload-Driven Transactional Partitioning for Distributed Databases." In Data Intelligence and Cognitive Informatics, 389–96. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8530-2_31.
Full textRashid, Md Mamunur, Md Rezaul Karim, Byeong-Soo Jeong, and Ho-Jin Choi. "Efficient Mining Regularly Frequent Patterns in Transactional Databases." In Database Systems for Advanced Applications, 258–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29038-1_20.
Full textNofong, Vincent Mwintieru. "Discovering Productive Periodic Frequent Patterns in Transactional Databases." In Data Science, 141–50. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24474-7_20.
Full textConference papers on the topic "Transactional databases"
Xiang, Yang, Ruoming Jin, David Fuhry, and Feodor F. Dragan. "Succinct summarization of transactional databases." In the 14th ACM SIGKDD international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1401890.1401981.
Full textPalmerini, P., S. Orlando, and R. Perego. "Statistical properties of transactional databases." In the 2004 ACM symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/967900.968009.
Full text"TRANSACTIONAL SUPPORT IN NATIVE XML DATABASES." In 10th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001725303680373.
Full textSreedevi, M., and L. S. S. Reddy. "Mining regular closed patterns in transactional databases." In 2013 7th International Conference on Intelligent Systems and Control (ISCO). IEEE, 2013. http://dx.doi.org/10.1109/isco.2013.6481184.
Full textWelke, Pascal. "Efficient Frequent Subgraph Mining in Transactional Databases." In 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA). IEEE, 2020. http://dx.doi.org/10.1109/dsaa49011.2020.00044.
Full textTanbeer, Syed Khairuzzaman, Chowdhury Farhan Ahmed, and Byeong-Soo Jeong. "Mining Regular Patterns in Incremental Transactional Databases." In 2010 12th Asia Pacific Web Conference (APWEB). IEEE, 2010. http://dx.doi.org/10.1109/apweb.2010.69.
Full textDey, Akon, Alan Fekete, Raghunath Nambiar, and Uwe Rohm. "YCSB+T: Benchmarking web-scale transactional databases." In 2014 IEEE 30th International Conference on Data Engineering Workshops (ICDEW). IEEE, 2014. http://dx.doi.org/10.1109/icdew.2014.6818330.
Full textLeis, Viktor, Alfons Kemper, and Thomas Neumann. "Exploiting hardware transactional memory in main-memory databases." In 2014 IEEE 30th International Conference on Data Engineering (ICDE). IEEE, 2014. http://dx.doi.org/10.1109/icde.2014.6816683.
Full textRazdan, Varun, Aman Modi, Shruti Dumbare, and Rahul Jobanputra. "YCSB+T: Benchmark for transactional databases and performance." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8212845.
Full textThomas Mason, Robert. "NoSQL Databases and Data Modeling for a Document-oriented NoSQL Database." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2245.
Full textReports on the topic "Transactional databases"
Tolan, Gil D. Transaction Design Specification Medical Exam Databases System (MED) update Transaction. Fort Belvoir, VA: Defense Technical Information Center, December 1986. http://dx.doi.org/10.21236/ada271597.
Full textKang, Myong H., Oliver Costich, and Judith N. Froscher. A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. Fort Belvoir, VA: Defense Technical Information Center, January 1992. http://dx.doi.org/10.21236/ada462360.
Full textCostich, Oliver, and Sushil Jajodia. Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. Fort Belvoir, VA: Defense Technical Information Center, January 1993. http://dx.doi.org/10.21236/ada465420.
Full textCostich, Oliver. Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture. Fort Belvoir, VA: Defense Technical Information Center, January 1992. http://dx.doi.org/10.21236/ada462366.
Full textCostich, Oliver, and John McDermott. A Multilevel Transaction Problem for Multilevel Secure Database Systems and its Solution for the Replicated Architecture. Fort Belvoir, VA: Defense Technical Information Center, January 1992. http://dx.doi.org/10.21236/ada462530.
Full textAvellán, Leopoldo, Arturo Galindo, Giulia Lotti, and Juan Pablo Rodríguez Bonilla. Open configuration options Bridging the Gap: Mobilization of Multilateral Development Banks in Infrastructure. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0004006.
Full text