Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Information Systems (H) > Database Management (H.2) > Database Administration (H.2.7) > Logging And Recovery (H.2.7...)  
 
Options:
 
  1-7 of 7 Reviews about "Logging And Recovery (H.2.7...)": Date Reviewed
  Preliminary instrumentation for the efficient use of Web-based electronic health records
Henrard S.  Computer-based medical systems (Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS’04),Jun 24-25, 2004) 102004.  Type: Proceedings

The software described in this paper, the Health Electronic Record Modeling Tool (HERMT), is a tiny piece of the electronic health records (EHRs) puzzle. What makes EHRs a puzzle is that everyone agrees that electronic patient records ...

May 4 2005
  Extended ephemeral logging: log storage management for applications with long lived transactions
Keen J., Dally W. ACM Transactions on Database Systems 22(1): 1-42, 1997.  Type: Article

Extended ephemeral locking (XEL) is a new technique for managing a log of database activity. XEL divides undo and redo logs into a chain of fixed-size queues. Log records that are no longer necessary for recovery are thrown away. After...

Sep 1 1997
  Evaluation of remote backup algorithms for transaction-processing systems
Polyzois C., García-Molina H. ACM Transactions on Database Systems 19(3): 423-449, 1994.  Type: Article

To ensure the operation of a database system after a disaster, a backup copy of the database and of the changes applied to it, that is, the redo-log, must be maintained at a remote geographical location. If the redo-log is only applied...

Aug 1 1995
  ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging
Mohan C., Haderle D., Lindsay B., Pirahesh H., Schwarz P. ACM Transactions on Database Systems 17(1): 94-162, 1992.  Type: Article

New algorithms for database recovery and rollbacks are described. The paper assumes that the database uses write-ahead logging (WAL), but it describes in fine detail how the various activities during the update, rollback, and recovery ...

Sep 1 1993
  On modeling of information retrieval concepts in vector spaces
Wong S., Ziarko W., Raghavan V., Wong P. ACM Transactions on Database Systems 12(2): 299-321, 1987.  Type: Article

In the vector space model (VSM) of information retrieval, the space for both documents and queries is an n-dimensional vector space, where n is the number of index terms. A document is represented by a vector of nonnegati...

Apr 1 1988
  Database integrity block construct: concepts and design issues
Lilien L., Bhargava B. IEEE Transactions on Software Engineering SE-11(9): 865-885, 1985.  Type: Article

This paper investigates different implementation techniques of database recovery. It proposes a database system with a recovery concept which I will classify according to the taxonomy of Haerder and Reuter [1]:...

Apr 1 1986
  Analysis of interleaved storage via a constant-service queuing system with Markov-chain-driven input
Hofri M. Journal of the ACM 31(3): 628-648, 1984.  Type: Article

Store interleaving was invented by engineers as a means of improving the rate at which data could be accessed from slow stores. Such systems have subsequently been subjected to various forms of analysis. Here a mathematical modeling te...

Jul 1 1985
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy