The Potential Application Of Blind Write Protocol
The current approach to handle interleaved write operation and preserve consistency in relational database system relies on locking protocol. The application system does not have other option to deal with interleaved write operation. In other hand, allowing more write operations to be interleaved wi...
Saved in:
Main Authors: | Suryana, Nanna, Anshar, Khairul, Abdullah, Noraswaliza |
---|---|
Format: | Article |
Language: | English |
Published: |
Machine Intelligence Research Labs.
2018
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/23056/2/IJCISIM_22.pdf http://eprints.utem.edu.my/id/eprint/23056/ http://www.mirlabs.org/ijcisim/regular_papers_2018/IJCISIM_22.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Data Mining Approach For Developing Quality Prediction Model In Multi-Stage Manufacturing
by: Arif, Fahmi, et al.
Published: (2013) -
Surface Defect Detection And Classification Based On Statistical Filter And Decision Tree
by: Akbar, Habibullah, et al.
Published: (2013) -
Reflection decomposition in single images using an optimum thresholding-based method
by: Suryana, Nanna, et al.
Published: (2012) -
Blind encoding into qudits
by: Shamsul Shaari, Jesni, et al.
Published: (2008) -
Markov Chain Model And Performance Enhancement For EDCA Protocol
by: Abu-Khadrah, Ahmed Ismail Mohammad, et al.
Published: (2016)