TIMESTAMP-BASED ORPHAN ELIMINATION

被引:5
|
作者
HERLIHY, MP
MCKENDRY, MS
机构
[1] CARNEGIE MELLON UNIV,DEPT COMP SCI,PITTSBURGH,PA 15213
[2] FILENET CORP,COSTA MESA,CA 92626
关键词
D O I
10.1109/32.29482
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:825 / 831
页数:7
相关论文
共 50 条
  • [11] Timestamp-based protocols for synchronizing access on XML documents
    Helmer, S
    Kanne, CC
    Moerkotte, G
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, 3180 : 591 - 600
  • [12] A secure and timestamp-based communication scheme for cloud environment
    Salim, Abu
    Tripathi, Sachin
    Tiwari, Rajesh Kumar
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) : 319 - 332
  • [13] A Scalable Timestamp-Based Durable Software Transactional Memory
    Liu C.
    Wang F.
    Zou X.
    Feng D.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (03): : 499 - 517
  • [14] An improved timestamp-based remote user authentication scheme
    Awasthi, Amit K.
    Srivastava, Keerti
    Mittal, R. C.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (06) : 869 - 874
  • [15] Cryptanalysis of an enhanced timestamp-based password authentication scheme
    Wang, B
    Li, JH
    Tong, ZP
    [J]. COMPUTERS & SECURITY, 2003, 22 (07) : 643 - 645
  • [16] A lightweight timestamp-based method for data replication in database
    Dai, Wei
    Chen, Yongyan
    Liu, Xiulan
    Cao, JingGuo
    Liang, Bo
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1491 - 1497
  • [17] Security Analysis on a Timestamp-based Remote User Authentication Scheme
    Tan, Zuowen
    Wang, Jianfeng
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (11) : 2838 - 2843
  • [18] A timestamp-based optimistic concurrency control for handling mobile transactions
    Choi, Ho-Jin
    Jeong, Byeong-Soo
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 796 - 805
  • [19] TIMEFLIP: Scheduling Network Updates with Timestamp-based TCAM Ranges
    Mizrahi, Tal
    Rottenstreich, Ori
    Moses, Yoram
    [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [20] Timestamp-Based Secure Shield Architecture for Detecting Invasive Attacks
    Bae, Junyeong
    Oh, Junseok
    Lee, Myoung Jin
    Lee, Young-woo
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2023, 31 (09) : 1358 - 1367