Distributed real time database systems: background and literature review

U Shanker, M Misra, AK Sarje - Distributed and parallel databases, 2008 - Springer
Today's real-time systems (RTS) are characterized by managing large volumes of dispersed
data making real-time distributed data processing a reality. Large business houses need to …

Temporal and real-time databases: A survey

G Ozsoyoglu, RT Snodgrass - IEEE Transactions on …, 1995 - ieeexplore.ieee.org
A temporal database contains time-varying data. In a real-time database transactions have
deadlines or timing constraints. In this paper we review the substantial research in these two …

Learning motion patterns in crowded scenes using motion flow field

M Hu, S Ali, M Shah - 2008 19th International Conference on …, 2008 - ieeexplore.ieee.org
Learning typical motion patterns or activities from videos of crowded scenes is an important
visual surveillance problem. To detect typical motion patterns in crowded scenarios, we …

Transaction scheduling protocols for controlling priority inversion: A review

S Pandey, U Shanker - Computer Science Review, 2020 - Elsevier
In advanced real-time distributed computing databases, the main performance criterion is to
reduce the 'deadline miss' by the transactions; of course, consistency constraints also need …

Aware object detection and pose estimation

D Glasner, M Galun, S Alpert, R Basri… - … on Computer Vision, 2011 - ieeexplore.ieee.org
We describe an approach to category-level detection and viewpoint estimation for rigid 3D
objects from single 2D images. In contrast to many existing methods, we directly integrate …

Concurrency control in mobile distributed real-time database systems

KY Lam, TW Kuo, WH Tsang, GCK Law - Information systems, 2000 - Elsevier
With the rapid advances in mobile computing technology, there is an increasing demand for
processing real-time transactions in a mobile environment. This paper studies concurrency …

Trust and electronic commerce-more than a technical problem

K Konrad, G Fuchs, J Barthel - … of the 18th IEEE Symposium on …, 1999 - ieeexplore.ieee.org
It is argued that the building of trust in electronic commerce depends only partly on technical
security, and the knowledge of security gaps and ways of closing them. It is not only a …

Lower bounds for quantum communication complexity

H Klauck - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We prove new lower bounds for bounded error quantum communication complexity. Our
methods are based on the Fourier transform of the considered functions. First we generalize …

On using priority inheritance-based distributed static two-phase locking protocol

S Pandey, U Shanker - Advances in Data and Information Sciences …, 2018 - Springer
Two-phase locking with high priority (2PL-HP), a well-suited concurrency control protocol for
distributed real-time database systems (DRTDBS) because of being free from priority …

Efficient validation of mobile transactions in wireless environments

VCS Lee, KW Lam, TW Kuo - Journal of Systems and Software, 2004 - Elsevier
In broadcast environments, the limited bandwidth of the upstream communication channel
from the mobile clients to the server bars the application of conventional concurrency control …