Academia.eduAcademia.edu

Transaction Management

description575 papers
group26 followers
lightbulbAbout this topic
Transaction Management is the process of overseeing and controlling the execution of transactions in a database or distributed system, ensuring data integrity, consistency, and reliability. It involves coordinating multiple operations to complete a transaction successfully while adhering to properties such as atomicity, consistency, isolation, and durability (ACID).
lightbulbAbout this topic
Transaction Management is the process of overseeing and controlling the execution of transactions in a database or distributed system, ensuring data integrity, consistency, and reliability. It involves coordinating multiple operations to complete a transaction successfully while adhering to properties such as atomicity, consistency, isolation, and durability (ACID).

Key research themes

1. How can preventive maintenance and software aging models optimize transaction-based software system availability and performance?

This research theme focuses on analyzing and modeling preventive maintenance strategies in transaction-based software systems that suffer from software aging phenomena. It addresses the challenge of determining optimal maintenance schedules to improve system availability and transaction response times, which is critical especially in safety-critical and high-availability systems where software failures can lead to significant operational losses.

Key finding: This paper presents an analytical stochastic model that captures the degradation of service rate due to software aging and the occurrence of crash/hang failures in transaction-based software. It demonstrates how two... Read more

2. What dynamic transaction management strategies improve deadline adherence in distributed real-time database systems?

This research strand investigates dynamic approaches to managing transactions in distributed real-time processing systems where heterogeneous, geographically distributed sites impose strict constraints such as deadlines. It emphasizes scheduling techniques and execution models that optimize timely transaction completion, minimize deadline misses, maintain atomicity through commit protocols, and adaptively adjust to varying workloads and system configurations.

Key finding: The paper introduces a dynamic transaction management framework for distributed real-time database systems that adaptively schedules and executes transactions to meet firm deadlines. Through simulation studies, it... Read more
Key finding: This study proposes a framework combining workload characterization via K-means clustering, resource allocation using virtual machines in cloud environments, and encryption-based security for transaction handling in... Read more
Key finding: This paper presents an algorithm that prevents distributed deadlocks by executing transactions requesting the same resources in a pipeline fashion. It effectively eliminates circular wait conditions without degrading resource... Read more

3. How do Java and Spring Boot frameworks ensure transactional integrity, security, and scalability in modern payment gateway systems?

Focusing on financial transaction management within payment gateways, this theme explores the role of Java and Spring Boot in delivering robust, secure, and scalable transaction processing systems. Research in this area examines integration of security protocols, transaction management patterns, compliance with regulatory frameworks, and architectural considerations such as microservices and blockchain, offering practical frameworks for designing resilient digital payment infrastructures.

Key finding: Through systematic literature review and industry case studies, this work highlights how Java frameworks like Spring provide transaction management modules, security features (such as authentication and encryption), and... Read more
Key finding: This paper outlines step-by-step methodologies for developing scalable and secure payment systems using Java and Spring Boot, emphasizing microservices architecture for fault isolation and resource optimization. Real-world... Read more

All papers in Transaction Management

AI models used for fraud detection are constantly updated to tackle new threats, but their explanation methods often stay static, leading to outdated or misleading interpretations. This research explores how adaptive explainable AI (XAI)... more
MACH is an operating system kernel under development at Carnegie-Mellon University to support distributed and parallel computation. MACH is designed to support computing environments consisting of networks of uniprocessors and... more
02 is the Object-Oriented Database System being developed at Alta'ir. The 02 Object Manager is the layer of the system concerned with complex object access and manipulation, transaction management, persistence and disk management., and... more
In this paper, I describe first the background behind the development of the original ARIES recovery method, and its significant impact on the commercial world and the research community. Next, I provide a brief introduction to the... more
Most distributed operating systems constructed to date have lacked a unifying mechanism for naming and protection. In this paper we discuss a system, Amoeba, that uses capabilities for naming and protecting objects. In contrast to... more
The power of networks manifests itself in a highly non-linear amplification of a number of effects, and their weaknessin propagation of cascading failures. The potential systemic risk effects can be either exacerbated or mitigated,... more
The power of networks manifests itself in a highly non-linear amplification of a number of effects, and their weaknessin propagation of cascading failures. The potential systemic risk effects can be either exacerbated or mitigated,... more
Multiple computers and/or processors offer interactive music systems more processing power, more inputs and outputs, and more tolerance to failure. Systems based on multiple computers require careful design paying particular attention to... more
The commit processing in a Distributed Real Time Database (DRTDBS) can significantly increase execution time of a transaction. Therefore, designing a good commit protocol is important for the DRTDBS; the main challenge is the adaptation... more
The healthcare industry is becoming more and more distributed; organizations are increasingly relying on mobile links to access patient information and to update their databases at the point of care. New technologies, such as Internet... more
This tutorial explains how to build a cloud-native architecture for fintech applications using scalable components and frameworks that provide enterprise-grade features. The tutorial focuses on applications that process payments and that... more
A real time distributed computing has heterogeneously networked computers to solve a single problem. So coordination of activities among computers is a complex task and deadlines make more complex. The performance of the system depends on... more
Today, data is flowing into various organizations at an unprecedented scale. The ability to scale out for processing an enhanced workload has become an important factor for the proliferation and popularization of database systems. Big... more
Multilevel petrinets are proposed for facilitating flexible modeling and control of complicated dynamic processes. A metapetrinet is able not only to change the marking of a petrinet but also to reconfigure dynamically its structure. Each... more
In many workloads, most write operations performed on a file system modify only a small number of blocks. The log-structured file system was designed for such a workload, additionally with the aim of fast crash recovery and system... more
This paper explains Concurrency control is a database management systems concept that is used to address occurs with a multiuser system. It helps you to make sure that database transactions are performed concurrently without violating the... more
Automation and intelligence constitute a major preoccupation in the field of software engineering. With the great evolution of Artificial Intelligence, researchers and industry were steered to the use of Machine Learning and Deep Learning... more
The paper describes real time extensions to the Open Object Oriented Database system using the RTSORAC data model. This model combines an object oriented data model, real time requirements, flexible transactions, semantic relationships... more
ehps.net/ehp The European Health Psychologist This update includes information regarding the EHPS-UNDPI members’ activities during the past four years. The following sections delineate our status and activities related to the UNDP. It has... more
The task of WP6 is to evaluate the CONNECT technologies under realistic situations. To achieve this goal, WP6 concentrated its 3rd year effort on the development of a main scenario in the context of GMES, which requires the connection of... more
In this paper, we have proposed the strategies for concurrency control of global transactions in heterogeneous distributed database systems. We have focused on the issues of consistency, local autonomy and performance. A technique to... more
The Race condition is a privilege escalation vulnerability that manipulates the time between imposing a security control and using services in a UNIX like system. This vulnerability is a result of interferences caused by multiple... more
The payment industry has undergone successful innovation in the last decade due to technological change and other drivers that require efficiency in payment systems. Some of the most effective tools currently being used to create such... more
There is a tremendous growth of the mobile users everywhere which in turn leaded to high bandwidth requirements of new cellular services. But the bandwidth scenario is dependent on limited spectrum resources that have been allocated for... more
Abstract. Mapping XML documents into relational database is a promising solution because relational databases are mature and scale very well and they have the advantages that in a relational database XML data and structured data can... more
Due to the successful development of the Internet, the course of distributed systems has received great attention by many universities and colleges in their computer science curricula. A comprehensive distributed system course involves... more
Data is often replicated in distributed database applications to improve availability and response time. Conventional multi-copy algorithms deliver fast response times and high availability for read-only transactions while sacrificing... more
In this paper, we introduce and describe directed dependency graph-based transaction and concurrency control (DCC) for persistent (stable, single-level) object-based bulk data management systems. The new technique is optimistic and... more
We introduce IceFS, a novel file system that separates physical structures of the file system. A new abstraction, the cube, is provided to enable the grouping of files and directories inside a physically isolated container. We show three... more
This research work addresses the daily challenges encountered by loan applicants requesting for loan facilities from a loan scheme and the unnecessary end-to-end delays in the processing and some time the computational errors associated... more
As mobile devices get ubiquitous and grow in computational power, their management of interdependent data also becomes increasingly important. The mobile environment exhibits all the characteristics of a distributed database plus the... more
XML is becoming a standard for information representation and exchange for electronic and mobile commerce. While almost all of these applications require an XML storage, e.g., for managing their transaction data, messages, or metadata,... more
XML is becoming a standard for information representation and exchange for electronic and mobile commerce. While almost all of these applications require an XML storage, e.g., for managing their transaction data, messages, or metadata,... more
To allow mobile users to continue their work while disconnected, mobile systems usually rely on optimistic replication techniques. In mobile database systems, mobile units cache subsets of the database state and allow disconnected users... more
This paper descrbes two protocols for the detection of deadlocks in distributed data bases-a hierarchically organized one and a distributed one. A graph model which depicts the state of execution of all transactions in the system is used... more
Today, Cloud computing is most widely used system due to number of benefits to end users. In IT (Information Technology) organizations, cloud computing is most vital domain to work. There are different types of services such as SaaS, IaaS... more
We propose a consistency model for a data store in the Cloud and work towards the goal of deploying Database as a Service over the Cloud. This includes consistency across the data partitions and consistency of any replicas that exist... more
The work described in this article arises from two needs. First, there is still a need for providing more sophisticated database systems than just relational ones. Secondly, there is a growing need for distributed databases. These needs... more
This study discusses the main relevant use of Java in keeping the payment gateways' transaction security and integrity stable. Various security measures, authentication and authorization procedures, Java features, frameworks and... more
Patterns and Pattern Languages are ways to capture experience and make it reusable for others, and describe best practices and good designs. Patterns are solutions to recurrent problems. This paper addresses the database integrity... more
by R FA
Transaction is an important concept in the database systems, it moves the database from consistent state to a new consistent state, so that users trust the information retrieved from information systems. A mobile user usually works... more
Distributed systems with a centralized architecture present the well known problems of single point of failure and single point of congestion; therefore, they do not scale. Decentralized systems, especially as peer-to-peer networks, are... more
In this paper we consider mechanisms for supporting recoverable-persistence in a single address space memory model. In particular, we consider a memory management system, MMS, for a persistent single address space and show how the... more
Peut-être aimez-vous à retrouver dans votre lit, après une journée harassante, votre oreiller à mémoire de forme? Ces oreillers contiennent généralement du polyuréthane qui leur permet de reprendre leur forme originelle après qu'on se... more
Using dynamic object-orien ted features, a mainframe implementation of a Smalltalk-like execution environment suppovts a critical application and can accommodate change.
A stable heap is storage that is managed automatically using garbage collection, manipulated using atomic transactions, and accessed using a uniform storage model. These featnres enhance reliability and simplify programming by preventing... more
We introduce TxFS, a novel transactional file system that builds upon a file system's atomic-update mechanism such as journaling. Though prior work has explored a number of transactional file systems, TxFS has a unique set of properties:... more
The traditional wisdom for designing database schemas is to use a design tool (typically based on a UML or E-R model) to construct an initial data model for one's data. When one is satisfied with the result, the tool will automatically... more
Download research papers for free!