Performance analysis of data sharing environments / (Record no. 72902)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03100nam a2200517 i 4500 |
001 - CONTROL NUMBER | |
control field | 6267244 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220712204608.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 151228s2003 maua ob 001 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780262255974 |
-- | electronic |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | |
082 00 - CLASSIFICATION NUMBER | |
Call Number | 005.74 |
100 1# - AUTHOR NAME | |
Author | Dan, Asit, |
245 10 - TITLE STATEMENT | |
Title | Performance analysis of data sharing environments / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 PDF (xxi, 118 pages) : |
490 1# - SERIES STATEMENT | |
Series statement | Acm distinguished dissertation |
500 ## - GENERAL NOTE | |
Remark 1 | Thesis (Ph. D.)--University of Massachusetts, Amherst, 1990. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Large transaction-processing applications, such as banking, flight reservations, telecommunications, and networking, demand increasingly high throughput and fast response times. Coupling multiple systems for database transaction processing can provide these systems with higher capacity and availability at a lower cost. Data sharing is one promising architecture for such an environment.This monograph develops a comprehensive model for analyzing the design and performance of a complex data-sharing environment that consists of multiple, loosely coupled transaction-processing nodes with a common database at the disk level. By capturing the salient features of this data sharing architecture database buffers at each node with their buffer management policies, concurrency control, buffer coherency, nonuniform database access, and CPU queueing delay - the model can be used to answer a number of design questions about scalability, buffer utilization, skewed access, policy selection, and optimal system configuration. Included are two new submodels, for private and shared buffers.Asit Dan is a Research Staff Member at the IBM T. J. Watson Research Center. |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6267244 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cambridge, Massachusetts : |
-- | MIT Press, |
-- | c1992. |
264 #2 - | |
-- | [Piscataqay, New Jersey] : |
-- | IEEE Xplore, |
-- | [2003] |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | electronic |
-- | isbdmedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 ## - | |
-- | Description based on PDF viewed 12/28/2015. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Transaction systems (Computer systems) |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Database management. |
No items available.