|
Browse All Reviews > Information Systems (H) > Database Management (H.2) > Database Administration (H.2.7) > Logging And Recovery (H.2.7...)
|
|
|
|
|
|
|
|
|
1-7 of 7
Reviews about "Logging And Recovery (H.2.7...)":
|
Date Reviewed |
|
Preliminary instrumentation for the efficient use of Web-based electronic health records Henrard S. Computer-based medical systems (Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS’04),Jun 24-25, 2004) 102004. Type: Proceedings
The software described in this paper, the Health Electronic Record Modeling Tool (HERMT), is a tiny piece of the electronic health records (EHRs) puzzle. What makes EHRs a puzzle is that everyone agrees that electronic patient records ...
|
May 4 2005 |
|
Extended ephemeral logging: log storage management for applications with long lived transactions Keen J., Dally W. ACM Transactions on Database Systems 22(1): 1-42, 1997. Type: Article
Extended ephemeral locking (XEL) is a new technique for managing a log of database activity. XEL divides undo and redo logs into a chain of fixed-size queues. Log records that are no longer necessary for recovery are thrown away. After...
|
Sep 1 1997 |
|
Evaluation of remote backup algorithms for transaction-processing systems Polyzois C., García-Molina H. ACM Transactions on Database Systems 19(3): 423-449, 1994. Type: Article
To ensure the operation of a database system after a disaster, a backup copy of the database and of the changes applied to it, that is, the redo-log, must be maintained at a remote geographical location. If the redo-log is only applied...
|
Aug 1 1995 |
|
ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging Mohan C., Haderle D., Lindsay B., Pirahesh H., Schwarz P. ACM Transactions on Database Systems 17(1): 94-162, 1992. Type: Article
New algorithms for database recovery and rollbacks are described. The paper assumes that the database uses write-ahead logging (WAL), but it describes in fine detail how the various activities during the update, rollback, and recovery ...
|
Sep 1 1993 |
|
On modeling of information retrieval concepts in vector spaces Wong S., Ziarko W., Raghavan V., Wong P. ACM Transactions on Database Systems 12(2): 299-321, 1987. Type: Article
In the vector space model (VSM) of information retrieval, the space for both documents and queries is an n-dimensional vector space, where n is the number of index terms. A document is represented by a vector of nonnegati...
|
Apr 1 1988 |
|
Database integrity block construct: concepts and design issues Lilien L., Bhargava B. IEEE Transactions on Software Engineering SE-11(9): 865-885, 1985. Type: Article
This paper investigates different implementation techniques of database recovery. It proposes a database system with a recovery concept which I will classify according to the taxonomy of Haerder and Reuter [1]:...
|
Apr 1 1986 |
|
Analysis of interleaved storage via a constant-service queuing system with Markov-chain-driven input Hofri M. Journal of the ACM 31(3): 628-648, 1984. Type: Article
Store interleaving was invented by engineers as a means of improving the rate at which data could be accessed from slow stores. Such systems have subsequently been subjected to various forms of analysis. Here a mathematical modeling te...
|
Jul 1 1985 |
|
|
|
|
|
|