| Document Date: 2009-09-29 10:22:42 Open Document File Size: 302,40 KBShare Result on Facebook
City Lyon / / Company LOCKING EXISTING RESOURCES / DC’s / ACM / Microsoft / / Currency pence / / / Event FDA Phase / / Facility University of Minnesota / / IndustryTerm table locking protocol / lock protocols / multi-granularity protocols / partition lock protocols / partition lock protocol / partition locking protocol / query processing / database systems / unbundled transaction services / main locking protocol / range search / conventional locking protocols / query processor / speculative locking protocol / extensible database systems / disk management / database technology / range search request / table lock protocol / transactional services / database management systems / conventional locking protocol / lock protocol / data management services / data management / cloud computing / multi-core hardware / transaction services / proposed locking protocols / conventional key locking protocol / proposed partition locking protocol / speculative visit protocol / / Organization Paper Organization / University of Minnesota / Minneapolis / VLDB Endowment / Very Large Data Base Endowment / NT NR / / Person David Lomet Mohamed / / Position manager algorithms / lock manager / manager table / storage manager / manager deals / / Product TC / SERIALIZABLE / / ProgrammingLanguage R / Microsoft SQL Server / DC / / PublishedMedium the TC post / / Technology four locking protocols / table locking protocol / partition lock protocols / second protocol / speculative locking protocol / Partition Lock protocol / locking protocol / query processor / proposed three locking protocols / conventional locking protocols / main locking protocol / locking protocols / conventional locking protocol / proposed partition locking protocol / partition locking protocol / key lock protocol / proposed locking protocols / conventional key locking protocol / table lock protocol / locking manager algorithms / two locking protocols / lock protocols / multi-granularity protocols / database technology / speculative visit protocol / using the table lock protocol / /
SocialTag |