A New Methodology to Evaluate Locking Protocols.
Resource URI: https://dblp.l3s.de/d2r/resource/publications/journals/tkde/HuangC90
Home
|
Example Publications
Property
Value
dcterms:
bibliographicCitation
<
http://dblp.uni-trier.de/rec/bibtex/journals/tkde/HuangC90
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Yeh-Hao_Chin
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Yin-Fu_Huang
>
foaf:
homepage
<
http://dx.doi.org/doi.org%2F10.1109%2F69.63255
>
foaf:
homepage
<
https://doi.org/10.1109/69.63255
>
dc:
identifier
DBLP journals/tkde/HuangC90
(xsd:string)
dc:
identifier
DOI doi.org%2F10.1109%2F69.63255
(xsd:string)
dcterms:
issued
1990
(xsd:gYear)
swrc:
journal
<
https://dblp.l3s.de/d2r/resource/journals/tkde
>
rdfs:
label
A New Methodology to Evaluate Locking Protocols.
(xsd:string)
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Yeh-Hao_Chin
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Yin-Fu_Huang
>
swrc:
number
4
(xsd:string)
swrc:
pages
431-435
(xsd:string)
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/focs/KedemS79
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/conf/sigmod/AgrawalCL85
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/cacm/EswarranGLT76
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/cacm/PotierL80
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/jacm/MitraW84
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/jacm/TaySG85
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tods/RiesS77
>
dcterms:
references
<
https://dblp.l3s.de/d2r/resource/publications/journals/tods/RiesS79
>
owl:
sameAs
<
http://bibsonomy.org/uri/bibtexkey/journals/tkde/HuangC90/dblp
>
owl:
sameAs
<
http://dblp.rkbexplorer.com/id/journals/tkde/HuangC90
>
rdfs:
seeAlso
<
http://dblp.uni-trier.de/db/journals/tkde/tkde2.html#HuangC90
>
rdfs:
seeAlso
<
https://doi.org/10.1109/69.63255
>
dc:
subject
average lock range; evaluation factor; locking-based concurrency control methods; nonstructural locking; queueing model; ALR; popular locking protocols; 2PL protocol; tree protocol; simulation; correctness; concurrency control; distributed databases; protocols; trees (mathematics)
(xsd:string)
dc:
title
A New Methodology to Evaluate Locking Protocols.
(xsd:string)
dc:
type
<
http://purl.org/dc/dcmitype/Text
>
rdf:
type
swrc:Article
rdf:
type
foaf:Document
swrc:
volume
2
(xsd:string)