• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Qiang, Wang Hongan, Jin Hong, Fu Yong, and Dai Guozhong. A Concurrency Control Protocol for Scheduling Mixed Real-Time Transactions[J]. Journal of Computer Research and Development, 2005, 42(1): 18-29.
Citation: Wang Qiang, Wang Hongan, Jin Hong, Fu Yong, and Dai Guozhong. A Concurrency Control Protocol for Scheduling Mixed Real-Time Transactions[J]. Journal of Computer Research and Development, 2005, 42(1): 18-29.

A Concurrency Control Protocol for Scheduling Mixed Real-Time Transactions

More Information
  • Published Date: January 14, 2005
  • Previous study of real-time databases mainly focuses on scheduling and concurrency control of single type real-time transactions. However, there is a very common demand on processing mixed transactions. This paper first introduces a two-level real-time database system model, which provides the support of using aperiodic task scheduling algorithms to improve the system performance. Next, a new real-time concurrency control protocol called mixed concurrency control with dynamic adjustment of serialization order using timestamp intervals (MCC-DATI) is proposed to ensure the data consistency among mixed transactions. The schedulability of hard real-time transactions can be guaranteed by adopting dynamic priority driven scheduling algorithm and bounding the blocking time from aperiodic soft real-time transactions, and the deadline miss ratio of soft real-time transactions may be reduced by adopting aperiodic task scheduling algorithm and dynamic adjustment of serialization order using timestamp intervals. Simulation experiments show that the MCC-DATI protocol can improve the system performance under different workloads and deadline constraints, as compared with previous concurrency control protocols of mixed transactions.
  • Related Articles

    [1]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [2]Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
    [3]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [4]Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.
    [5]Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585.
    [6]Li Lin and Lu Xianliang. An Algorithm for Detecting Filters Conflicts Based on the Intersection of Bit Vectors[J]. Journal of Computer Research and Development, 2008, 45(2): 237-245.
    [7]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [8]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    [9]Mao Tianlu, Wang Zhaoqi, Xia Shihong. An Algorithm for Collision Detection and Response Between Human Body Model and Cloth in 3D Garment Simulation[J]. Journal of Computer Research and Development, 2006, 43(2): 356-361.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (639) PDF downloads (544) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return