• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liao Guoqiong, Liu Yunsheng, Xiao Yingyuan. A Partition Fuzzy Checkpointing Strategy for Real-Time Main Memory Databases[J]. Journal of Computer Research and Development, 2006, 43(7): 1291-1296.
Citation: Liao Guoqiong, Liu Yunsheng, Xiao Yingyuan. A Partition Fuzzy Checkpointing Strategy for Real-Time Main Memory Databases[J]. Journal of Computer Research and Development, 2006, 43(7): 1291-1296.

A Partition Fuzzy Checkpointing Strategy for Real-Time Main Memory Databases

More Information
  • Published Date: July 14, 2006
  • Checkpointing is one of the important recovery techniques of real-time main memory database systems (RTMMDBS). Through analyzing the data characteristics in RTMMDBS, a method to calculate data checkpointing priorities is presented, which takes the timing constraints of both data and transactions into consideration. A partition fuzzy checkpionting strategy based on data segment checkpointing priority—PFCS-SCP is suggested, and the correctness of PFCE-SCP is also discussed. It is shown through performance testing that PFCS-SCP strategy can decrease the missing ratio of transactions in RTMMDBS.
  • Related Articles

    [1]Liu Shuai, Qiao Ying, Luo Xiongfei, Zhao Yijing, Wang Hong’an. Key Techniques of Time Series Databases: A Survey[J]. Journal of Computer Research and Development, 2024, 61(3): 614-638. DOI: 10.7544/issn1000-1239.202330536
    [2]Cao Rong, Bao Liang, Cui Jiangtao, Li Hui, Zhou Heng. Survey of Approaches to Parameter Tuning for Database Systems[J]. Journal of Computer Research and Development, 2023, 60(3): 635-653. DOI: 10.7544/issn1000-1239.202110976
    [3]Li Shunyong, Zhang Miaomiao, Cao Fuyuan. A MD fuzzy k-modes Algorithm for Clustering Categorical Matrix-Object Data[J]. Journal of Computer Research and Development, 2019, 56(6): 1325-1337. DOI: 10.7544/issn1000-1239.2019.20180737
    [4]Hillel Avni, Wang Peng. Persistent Transactional Memory for Databases[J]. Journal of Computer Research and Development, 2018, 55(2): 305-318. DOI: 10.7544/issn1000-1239.2018.20170863
    [5]Zhou Zhiping, Zhu Shuwei, Zhang Daowen. Multiobjective Clustering Algorithm with Fuzzy Centroids for Categorical Data[J]. Journal of Computer Research and Development, 2016, 53(11): 2594-2606. DOI: 10.7544/issn1000-1239.2016.20150467
    [6]Xian Hequn, Feng Dengguo. An Integrity Checking Scheme in Outsourced Database Model[J]. Journal of Computer Research and Development, 2010, 47(6): 1107-1115.
    [7]Zhou Da, Liang Zhichao, Meng Xiaofeng. HF-Tree: An Update-Efficient Index for Flash Memory[J]. Journal of Computer Research and Development, 2010, 47(5): 832-840.
    [8]Yan Heping, Wang Zhengfei, Wang Wei, Shi Baile. Inference Based Security Database Auditing Framework[J]. Journal of Computer Research and Development, 2006, 43(9): 1630-1638.
    [9]Hao Zhongxiao, Han Qilong. Real-Time Multiversion Concurrency Control Based on Validation Factor[J]. Journal of Computer Research and Development, 2006, 43(3): 522-527.
    [10]Li Guohui, Wang Hongya, Liu Yunsheng. Updates Dissemination in Mobile Real-Time Database Systems[J]. Journal of Computer Research and Development, 2005, 42(11): 2004-2009.

Catalog

    Article views (689) PDF downloads (424) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return