An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained c...An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained control within in a transaction. Based on the classical nested locking protocol and the speculative concurrency control approach, a two-shadow adaptive concurrency control protocol, which combines the Sacrifice based Optimistic Concurrency Control (OPT-Sacrifice) and High Priority two-phase locking (HP2PL) algorithms together to support both optimistic and pessimistic shadow of each sub-transaction, has been proposed to increase the likelihood of successful timely commitment and to avoid unnecessary replication overload.展开更多
Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each ...Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly.展开更多
High rates of overlapping sexual relationships (concurrency) are believed to be important in the generation of generalized HIV epidemics in sub-Saharan Africa. Different authors favor socioeconomic, gender-equity or c...High rates of overlapping sexual relationships (concurrency) are believed to be important in the generation of generalized HIV epidemics in sub-Saharan Africa. Different authors favor socioeconomic, gender-equity or cultural explanations for the high concurrency rates in this region. We performed linear regression to analyze the association between the point-prevalence of concurrency in 15 - 49 years old males and various indicators of socioeconomic status and gender-equity using data from 11 countries surveyed in 1989/1990. We found no meaningful association between concurrency and the various markers of socioeconomic status and gender-equity. This analysis supports the findings of other studies that high concurrency rates in sub-Saharan Africa could be reduced without having to address socioeconomic and gender-equity factors.展开更多
In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can e...In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold.展开更多
The lessons of history indicate that mismanagement of natural resources and the environment often leads to potentially adverse consequences. The increasing interest in economic development, particularly in the develop...The lessons of history indicate that mismanagement of natural resources and the environment often leads to potentially adverse consequences. The increasing interest in economic development, particularly in the developing countries of the world coupled with increasing population pressures and the globalization of economic activity is placing noticeable stresses on the ultimate sustainability of both human and environmental systems. Sustainable development is not a new concept. It has been an area of concern for different elements of society for some time. Yet efforts to understand the implications of sustainable development have not, until recently, been formalized. We have focused singularly on economic development and environmental quality as if they were mutually exclusive. This paper focuses on the concept of concurrency as both a conceptual framework and practicable method of understanding and implementing the ecology and economy of sustainability.展开更多
Remaining time prediction of business processes plays an important role in resource scheduling and plan making.The structural features of single process instance and the concurrent running of multiple process instance...Remaining time prediction of business processes plays an important role in resource scheduling and plan making.The structural features of single process instance and the concurrent running of multiple process instances are the main factors that affect the accuracy of the remaining time prediction.Existing prediction methods does not take full advantage of these two aspects into consideration.To address this issue,a new prediction method based on trace representation is proposed.More specifically,we first associate the prefix set generated by the event log to different states of the transition system,and encode the structural features of the prefixes in the state.Then,an annotation containing the feature representation for the prefix and the corresponding remaining time are added to each state to obtain an extended transition system.Next,states in the extended transition system are partitioned by the different lengths of the states,which considers concurrency among multiple process instances.Finally,the long short-term memory(LSTM)deep recurrent neural networks are applied to each partition for predicting the remaining time of new running instances.By extensive experimental evaluation using synthetic event logs and reallife event logs,we show that the proposed method outperforms existing baseline methods.展开更多
Concurrency control is a critical technology and one of the problems in CSCW systems. With the development of agent based technology, it has also been applied to research and development of CSCW systems. An Agent ba...Concurrency control is a critical technology and one of the problems in CSCW systems. With the development of agent based technology, it has also been applied to research and development of CSCW systems. An Agent based method for concurrency control in CSCW is explored in this paper. This new way is achieved by making use of the thoughts of AOP (Agent Oriented Programming) to improve traditional locking method, on the basis of researching characteristics and functional requirements of concurrency control in CSCW, and analyzing various usually used concurrency control methods. All amendments to locking method are done on the basis of the analysis of limitations brought by locking. In this paper, a new algorithm supporting queue of locking request for Agent based concurrency control is also presented. All above aspects are discussed in some detail in this paper.展开更多
Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transact...Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance.展开更多
Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of sa...Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of satisfying the timing constraints of transactions, serializability is too strong as a correctness criterion and not suitable for real time databases in most cases. On the other hand, relaxed serializability including epsilon serializability and similarity serializability can allow more real time transactions to satisfy their timing constraints, but database consistency may be sacrificed to some extent. We thus propose the use of weak serializability(WSR) that is more relaxed than conflicting serializability while database consistency is maintained. In this paper, we first formally define the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol WDHP(weak serializable distributed high priority protocol) is outlined for distributed real time databases, where a new lock mode called mask lock mode is proposed for simplifying the condition of global consistency. Finally, through a series of simulation studies, it is shown that using the new concurrency control protocol the performance of distributed real time databases can be greatly improved.展开更多
The problem of maintaining data consistency in mobile broadcast environments is researched. Quasi serializability is formally defined and analyzed at first. It was shown that quasi serializability is less stringent th...The problem of maintaining data consistency in mobile broadcast environments is researched. Quasi serializability is formally defined and analyzed at first. It was shown that quasi serializability is less stringent than serializability when database consistency is maintained for transactions. Then, corresponding concurrency control protocol that supports both update transactions and read-only transactions is outlined for mobile broadcast environments. Finally, the simulation results confirmed that the proposed protocol could improve the response time significantly.展开更多
Given the asymmetric communication capabilities in mobile real-time environments, traditional serializability-based approaches are too restrictive, unnecessary, and impractical. The new notion of correctness called we...Given the asymmetric communication capabilities in mobile real-time environments, traditional serializability-based approaches are too restrictive, unnecessary, and impractical. The new notion of correctness called weak serializability is given. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol based on this criterion is outlined for real-time broadcast environments. The simulation results confirmed that the proposed techniques help mobile transactions to meet their deadlines and improve query response time.展开更多
This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, thro...This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, through a series of simulation studies, it shows that using the new concurrency control protocol the performance of distributed real-time databases can be much improved.展开更多
Objective: The prevalence of syphilis differs considerably between different populations and indi-vidual level risk factors such as number of sex partners seem unable to completely explain these differences. The effec...Objective: The prevalence of syphilis differs considerably between different populations and indi-vidual level risk factors such as number of sex partners seem unable to completely explain these differences. The effect of network level factors, such as the prevalence of partner concurrency, on syphilis prevalence has not hitherto been investigated. Study design: Linear regression was per-formed to assess the relationship between the prevalence of male concurrency and prevalence of syphilis in each of 11 countries for which we could obtain comparable data. The data for concur-rency prevalence was taken from the WHO/Global Programme on AIDS (GPA) sexual behavioural surveys. Syphilis prevalence rates were obtained from antenatal syphilis serology surveys done in the same countries. In addition, we used linear regression to assess if there was a relationship between syphilis and concurrency prevalence of various racial and ethnic groups within the United States and South Africa. Results: In the international study, we found a strong relationship between the prevalence of male concurrency and syphilis prevalence (r = 0.79, P = 0.003). In the subnational studies, the relationship between concurrency and syphilis prevalence was positive in all cases but was only statistically significant so in the case of South Africa’s racial groups (r = 0.98, P = 0.01). Conclusions: The findings of an ecological-level association between syphilis and partner concurrency need to be replicated but suggest that efforts directed towards decreasing partner concurrency may reduce syphilis prevalence.展开更多
With the development of information technology and cloud computing,data sharing has become an important part of scientific research.In traditional data sharing,data is stored on a third-party storage platform,which ca...With the development of information technology and cloud computing,data sharing has become an important part of scientific research.In traditional data sharing,data is stored on a third-party storage platform,which causes the owner to lose control of the data.As a result,there are issues of intentional data leakage and tampering by third parties,and the private information contained in the data may lead to more significant issues.Furthermore,data is frequently maintained on multiple storage platforms,posing significant hurdles in terms of enlisting multiple parties to engage in data sharing while maintaining consistency.In this work,we propose a new architecture for applying blockchains to data sharing and achieve efficient and reliable data sharing among heterogeneous blockchains.We design a new data sharing transaction mechanism based on the system architecture to protect the security of the raw data and the processing process.We also design and implement a hybrid concurrency control protocol to overcome issues caused by the large differences in blockchain performance in our system and to improve the success rate of data sharing transactions.We took Ethereum and Hyperledger Fabric as examples to conduct crossblockchain data sharing experiments.The results show that our system achieves data sharing across heterogeneous blockchains with reasonable performance and has high scalability.展开更多
Deterministic databases are able to reduce coordination costs in a replication.This property has fostered a significant interest in the design of efficient deterministic concurrency control protocols.However,the state...Deterministic databases are able to reduce coordination costs in a replication.This property has fostered a significant interest in the design of efficient deterministic concurrency control protocols.However,the state-of-the-art deterministic concurrency control protocol Aria has three issues.First,it is impractical to configure a suitable batch size when the read-write set is unknown.Second,Aria running in low-concurrency scenarios,e.g.,a single-thread scenario,suffers from the same conflicts as running in high-concurrency scenarios.Third,the single-version schema brings write-after-write conflicts.To address these issues,we propose Gria,an efficient deterministic concurrency control protocol.Gria has the following properties.First,the batch size of Gria is auto-scaling.Second,Gria’s conflict probability in low-concurrency scenarios is lower than that in high-concurrency scenarios.Third,Gria has no write-after-write conflicts by adopting a multi-version structure.To further reduce conflicts,we propose two optimizations:a reordering mechanism as well as a rechecking strategy.The evaluation result on two popular benchmarks shows that Gria outperforms Aria by 13x.展开更多
Extendible hashing is an effective way to manage increasingly large file system metadata,but it suffers from low concurrency and lack of optimization for non-volatile memory(NVM).In this paper,a multilevel hash direct...Extendible hashing is an effective way to manage increasingly large file system metadata,but it suffers from low concurrency and lack of optimization for non-volatile memory(NVM).In this paper,a multilevel hash directory based on lazy expansion is designed to improve the concurrency and efficiency of extendible hashing,and a hash bucket management algorithm based on groups is presented to improve the efficiency of hash key management by reducing the size of the hash bucket,thereby improving the performance of extendible hashing.Meanwhile,a hierarchical storage strategy of extendible hashing for NVM is given to take advantage of dynamic random access memory(DRAM)and NVM.Furthermore,on the basis of the device driver for Intel Optane DC Persistent Memory,the prototype of high-concurrency extendible hashing named NEHASH is implemented.Yahoo cloud serving benchmark(YCSB)is used to test and compare with CCEH,level hashing,and cuckoo hashing.The results show that NEHASH can improve read throughput by up to 16.5%and write throughput by 19.3%.展开更多
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
The frequency and duration of observed concurrent hot and dry events(HDEs) over China during the growing season(April–September) exhibit significant decadal changes across the mid-1990s. These changes are characteriz...The frequency and duration of observed concurrent hot and dry events(HDEs) over China during the growing season(April–September) exhibit significant decadal changes across the mid-1990s. These changes are characterized by increases in HDE frequency and duration over most of China, with relatively large increases over southeastern China(SEC), northern China(NC), and northeastern China(NEC). The frequency of HDEs averaged over China in the present day(PD,1994–2011) is double that in the early period(EP, 1964–81);the duration of HDEs increases by 60%. Climate experiments with the Met Office Unified Model(MetUM-GOML2) are used to estimate the contributions of anthropogenic forcing to HDE decadal changes over China. Anthropogenic forcing changes can explain 60%–70% of the observed decadal changes,suggesting an important anthropogenic influence on HDE changes over China across the mid-1990s. Single-forcing experiments indicate that the increase in greenhouse gas(GHG) concentrations dominates the simulated decadal changes,increasing the frequency and duration of HDEs throughout China. The change in anthropogenic aerosol(AA) emissions significantly decreases the frequency and duration of HDEs over SEC and NC, but the magnitude of the decrease is much smaller than the increase induced by GHGs. The changes in HDEs in response to anthropogenic forcing are mainly due to the response of climatological mean surface air temperatures. The contributions from changes in variability and changes in climatological mean soil moisture and evapotranspiration are relatively small. The physical processes associated with the response of HDEs to GHG and AA changes are also revealed.展开更多
Concurrency control has always been one of the most important issues in the design of synchronous groupware systems with fully-replicated architecture. An ideal strate- gy should be able to support natural and flexibl...Concurrency control has always been one of the most important issues in the design of synchronous groupware systems with fully-replicated architecture. An ideal strate- gy should be able to support natural and flexible human-to-computer and human-to-human interactions while maintaining the consistency of the system. This paper summarizes previ- ous researches on this topic and points out the deficiencies of the existing results. A novel semantics-based concurrency control framework, oodOPT is proposed. The main idea of the framework is to resolve conflicts by utilizing semantics of the operations and the accessed data objects. With this approach, complexities in concurrency control are shifted completely from application developers to the framework. Conflicts among operations on objects with different semantics and the strategies resolving these conflicts are analyzed. After describing the algo- rithm in full detail, the discussion ends up with a comparison with other related work and some considerations for open problems.展开更多
Rust is a system-level programming language that provides thread and memory safety guarantee through a suite of static compiler checking rules and prevents segmentation errors.However,since compiler checking is too st...Rust is a system-level programming language that provides thread and memory safety guarantee through a suite of static compiler checking rules and prevents segmentation errors.However,since compiler checking is too strict to confine Rust's programmability,the developers prefer to use the keyword"unsafe"to bypass compiler checking,through which the caller could interact with OS directly.Unfortunately,the code block with"unsafe"would easily lead to some serious bugs such as memory safety violation,race condition and so on.In this paper,to verify memory and concurrency safety of Rust programs,we present RSMC(Safety Model Checker for Rust),a tool based on Smack to detect concurrency bugs and memory safety errors in Rust programs,in which we combine concurrency primitives model checking and memory boundary model checking.RSMC,with an assertion generator,can automatically insert assertions and requires no programmer annotations to verify Rust programs.We evaluate RSMC on two categories of Rust programs,and the result shows that RSMC can effectively find concurrency bugs and memory safety errors in vulnerable Rust programs,which include unsafe code.展开更多
文摘An integrated method for concurrency control in parallel real-time databases has been proposed in this paper. The nested transaction model has been investigated to offer more atomic execution units and finer grained control within in a transaction. Based on the classical nested locking protocol and the speculative concurrency control approach, a two-shadow adaptive concurrency control protocol, which combines the Sacrifice based Optimistic Concurrency Control (OPT-Sacrifice) and High Priority two-phase locking (HP2PL) algorithms together to support both optimistic and pessimistic shadow of each sub-transaction, has been proposed to increase the likelihood of successful timely commitment and to avoid unnecessary replication overload.
基金Supported by the Defense Pre-Research Project ofthe"Tenth Five-Year-Plan"of China (413150403)
文摘Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly.
文摘High rates of overlapping sexual relationships (concurrency) are believed to be important in the generation of generalized HIV epidemics in sub-Saharan Africa. Different authors favor socioeconomic, gender-equity or cultural explanations for the high concurrency rates in this region. We performed linear regression to analyze the association between the point-prevalence of concurrency in 15 - 49 years old males and various indicators of socioeconomic status and gender-equity using data from 11 countries surveyed in 1989/1990. We found no meaningful association between concurrency and the various markers of socioeconomic status and gender-equity. This analysis supports the findings of other studies that high concurrency rates in sub-Saharan Africa could be reduced without having to address socioeconomic and gender-equity factors.
文摘In parallel real-time database systems, concurrency control protocols must satisfy time constraints as well as the integrity constraints. The authors present a validation concurrency control(VCC) protocol, which can enhance the performance of real-time concurrency control mechanism by reducing the number of transactions that might miss their deadlines, and compare the performance of validation concurrency control protocol with that of HP2PL(High priority two phase locking) protocol and OCC-TI-WAIT-50(Optimistic concurrency control-time interval-wait-50) protocol under shared-disk architecture by simulation. The simulation results reveal that the protocol the author presented can effectively reduce the number of transactions restarting which might miss their deadlines and performs better than HP2PL and OCC-TI-WAIT-50. It works well when arrival rate of transaction is lesser than threshold. However, due to resource contention the percentage of missing deadline increases sharply when arrival rate is greater than the threshold.
文摘The lessons of history indicate that mismanagement of natural resources and the environment often leads to potentially adverse consequences. The increasing interest in economic development, particularly in the developing countries of the world coupled with increasing population pressures and the globalization of economic activity is placing noticeable stresses on the ultimate sustainability of both human and environmental systems. Sustainable development is not a new concept. It has been an area of concern for different elements of society for some time. Yet efforts to understand the implications of sustainable development have not, until recently, been formalized. We have focused singularly on economic development and environmental quality as if they were mutually exclusive. This paper focuses on the concept of concurrency as both a conceptual framework and practicable method of understanding and implementing the ecology and economy of sustainability.
基金supported by National Natural Science Foundation of China(No.U1931207 and No.61702306)Sci.&Tech.Development Fund of Shandong Province of China(No.ZR2019LZH001,No.ZR2017BF015 and No.ZR2017MF027)+4 种基金the Humanities and Social Science Research Project of the Ministry of Education(No.18YJAZH017)Shandong Chongqing Science and technology cooperation project(No.cstc2020jscx-lyjsAX0008)Sci.&Tech.Development Fund of Qingdao(No.21-1-5-zlyj-1-zc)the Taishan Scholar Program of Shandong ProvinceSDUST Research Fund(No.2015TDJH102 and No.2019KJN024).
文摘Remaining time prediction of business processes plays an important role in resource scheduling and plan making.The structural features of single process instance and the concurrent running of multiple process instances are the main factors that affect the accuracy of the remaining time prediction.Existing prediction methods does not take full advantage of these two aspects into consideration.To address this issue,a new prediction method based on trace representation is proposed.More specifically,we first associate the prefix set generated by the event log to different states of the transition system,and encode the structural features of the prefixes in the state.Then,an annotation containing the feature representation for the prefix and the corresponding remaining time are added to each state to obtain an extended transition system.Next,states in the extended transition system are partitioned by the different lengths of the states,which considers concurrency among multiple process instances.Finally,the long short-term memory(LSTM)deep recurrent neural networks are applied to each partition for predicting the remaining time of new running instances.By extensive experimental evaluation using synthetic event logs and reallife event logs,we show that the proposed method outperforms existing baseline methods.
文摘Concurrency control is a critical technology and one of the problems in CSCW systems. With the development of agent based technology, it has also been applied to research and development of CSCW systems. An Agent based method for concurrency control in CSCW is explored in this paper. This new way is achieved by making use of the thoughts of AOP (Agent Oriented Programming) to improve traditional locking method, on the basis of researching characteristics and functional requirements of concurrency control in CSCW, and analyzing various usually used concurrency control methods. All amendments to locking method are done on the basis of the analysis of limitations brought by locking. In this paper, a new algorithm supporting queue of locking request for Agent based concurrency control is also presented. All above aspects are discussed in some detail in this paper.
文摘Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance.
文摘Most of the proposed concurrency control protocols for real time database systems are based on serializability theorem. Owing to the unique characteristics of real time database applications and the importance of satisfying the timing constraints of transactions, serializability is too strong as a correctness criterion and not suitable for real time databases in most cases. On the other hand, relaxed serializability including epsilon serializability and similarity serializability can allow more real time transactions to satisfy their timing constraints, but database consistency may be sacrificed to some extent. We thus propose the use of weak serializability(WSR) that is more relaxed than conflicting serializability while database consistency is maintained. In this paper, we first formally define the new notion of correctness called weak serializability. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol WDHP(weak serializable distributed high priority protocol) is outlined for distributed real time databases, where a new lock mode called mask lock mode is proposed for simplifying the condition of global consistency. Finally, through a series of simulation studies, it is shown that using the new concurrency control protocol the performance of distributed real time databases can be greatly improved.
文摘The problem of maintaining data consistency in mobile broadcast environments is researched. Quasi serializability is formally defined and analyzed at first. It was shown that quasi serializability is less stringent than serializability when database consistency is maintained for transactions. Then, corresponding concurrency control protocol that supports both update transactions and read-only transactions is outlined for mobile broadcast environments. Finally, the simulation results confirmed that the proposed protocol could improve the response time significantly.
文摘Given the asymmetric communication capabilities in mobile real-time environments, traditional serializability-based approaches are too restrictive, unnecessary, and impractical. The new notion of correctness called weak serializability is given. After the necessary and sufficient conditions for weak serializability are shown, corresponding concurrency control protocol based on this criterion is outlined for real-time broadcast environments. The simulation results confirmed that the proposed techniques help mobile transactions to meet their deadlines and improve query response time.
基金the National Natural Science Foundation of China and the Commission of Science,Technokgy and Industry for National Defense
文摘This paper formally defines and analyses the new notion of correctness called quasi serializability, and then outlines corresponding concurrency control protocol QDHP for distributed real-time databases. Finally, through a series of simulation studies, it shows that using the new concurrency control protocol the performance of distributed real-time databases can be much improved.
文摘Objective: The prevalence of syphilis differs considerably between different populations and indi-vidual level risk factors such as number of sex partners seem unable to completely explain these differences. The effect of network level factors, such as the prevalence of partner concurrency, on syphilis prevalence has not hitherto been investigated. Study design: Linear regression was per-formed to assess the relationship between the prevalence of male concurrency and prevalence of syphilis in each of 11 countries for which we could obtain comparable data. The data for concur-rency prevalence was taken from the WHO/Global Programme on AIDS (GPA) sexual behavioural surveys. Syphilis prevalence rates were obtained from antenatal syphilis serology surveys done in the same countries. In addition, we used linear regression to assess if there was a relationship between syphilis and concurrency prevalence of various racial and ethnic groups within the United States and South Africa. Results: In the international study, we found a strong relationship between the prevalence of male concurrency and syphilis prevalence (r = 0.79, P = 0.003). In the subnational studies, the relationship between concurrency and syphilis prevalence was positive in all cases but was only statistically significant so in the case of South Africa’s racial groups (r = 0.98, P = 0.01). Conclusions: The findings of an ecological-level association between syphilis and partner concurrency need to be replicated but suggest that efforts directed towards decreasing partner concurrency may reduce syphilis prevalence.
基金supported by the National Key Research and Development Program of China(Nos.2020YFB1707900,2021YFB2700700)the National Natural Science Foundation of China(NSFC)(Grant No.62072035)+4 种基金the Open Research Projects of Zhejiang Lab(No.2020KE0AB04)CCF-Huawei Database System Innovation Research Plan(No.CCF-HuaweiDBIR2021007B)Ye Yuan is supported by the NSFC(Grant Nos.61932004,62225203,U21A20516)Xiaochun Yang is supported by the National Key Research and Development Program of China(No.2020YFB1707900)Guoren Wang is supported by the NSFC(Nos.61732003,U2001211).
文摘With the development of information technology and cloud computing,data sharing has become an important part of scientific research.In traditional data sharing,data is stored on a third-party storage platform,which causes the owner to lose control of the data.As a result,there are issues of intentional data leakage and tampering by third parties,and the private information contained in the data may lead to more significant issues.Furthermore,data is frequently maintained on multiple storage platforms,posing significant hurdles in terms of enlisting multiple parties to engage in data sharing while maintaining consistency.In this work,we propose a new architecture for applying blockchains to data sharing and achieve efficient and reliable data sharing among heterogeneous blockchains.We design a new data sharing transaction mechanism based on the system architecture to protect the security of the raw data and the processing process.We also design and implement a hybrid concurrency control protocol to overcome issues caused by the large differences in blockchain performance in our system and to improve the success rate of data sharing transactions.We took Ethereum and Hyperledger Fabric as examples to conduct crossblockchain data sharing experiments.The results show that our system achieves data sharing across heterogeneous blockchains with reasonable performance and has high scalability.
基金Key Laboratory Ministry of Industry and Information Technology of China,Shenzhen Science and Technology Program(Nos.GXWD20220817124827001 and JCYJ20210324132406016)National Natural Science Foundation of China(Grant No.61732022)National Science Foundation of Guangdong Province(No.2023A1515030273).
文摘Deterministic databases are able to reduce coordination costs in a replication.This property has fostered a significant interest in the design of efficient deterministic concurrency control protocols.However,the state-of-the-art deterministic concurrency control protocol Aria has three issues.First,it is impractical to configure a suitable batch size when the read-write set is unknown.Second,Aria running in low-concurrency scenarios,e.g.,a single-thread scenario,suffers from the same conflicts as running in high-concurrency scenarios.Third,the single-version schema brings write-after-write conflicts.To address these issues,we propose Gria,an efficient deterministic concurrency control protocol.Gria has the following properties.First,the batch size of Gria is auto-scaling.Second,Gria’s conflict probability in low-concurrency scenarios is lower than that in high-concurrency scenarios.Third,Gria has no write-after-write conflicts by adopting a multi-version structure.To further reduce conflicts,we propose two optimizations:a reordering mechanism as well as a rechecking strategy.The evaluation result on two popular benchmarks shows that Gria outperforms Aria by 13x.
基金Project supported by the National Natural Science Foundation of China(No.61806086)the National Key R&D Program of China(No.2018YFB0804204)。
文摘Extendible hashing is an effective way to manage increasingly large file system metadata,but it suffers from low concurrency and lack of optimization for non-volatile memory(NVM).In this paper,a multilevel hash directory based on lazy expansion is designed to improve the concurrency and efficiency of extendible hashing,and a hash bucket management algorithm based on groups is presented to improve the efficiency of hash key management by reducing the size of the hash bucket,thereby improving the performance of extendible hashing.Meanwhile,a hierarchical storage strategy of extendible hashing for NVM is given to take advantage of dynamic random access memory(DRAM)and NVM.Furthermore,on the basis of the device driver for Intel Optane DC Persistent Memory,the prototype of high-concurrency extendible hashing named NEHASH is implemented.Yahoo cloud serving benchmark(YCSB)is used to test and compare with CCEH,level hashing,and cuckoo hashing.The results show that NEHASH can improve read throughput by up to 16.5%and write throughput by 19.3%.
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
基金the University of Reading, funded by the UK–China Research and Innovation Partnership Fund through the Met Office Climate Science for Service Partnership (CSSP) China as part of the Newton Fundsupported by the National Natural Science Foundation of China (Grant Nos. 42030603 and 42175044)+1 种基金supported by CSSP-China. NPK was supported by an Independent Research Fellowship from the Natural Environment Research Council (Grant No. NE/L010976/1)supported by the National Centre for Atmospheric Science via the NERC/GCRF programme “Atmospheric hazards in developing countries: risk assessment and early warnings ” (ACREW)。
文摘The frequency and duration of observed concurrent hot and dry events(HDEs) over China during the growing season(April–September) exhibit significant decadal changes across the mid-1990s. These changes are characterized by increases in HDE frequency and duration over most of China, with relatively large increases over southeastern China(SEC), northern China(NC), and northeastern China(NEC). The frequency of HDEs averaged over China in the present day(PD,1994–2011) is double that in the early period(EP, 1964–81);the duration of HDEs increases by 60%. Climate experiments with the Met Office Unified Model(MetUM-GOML2) are used to estimate the contributions of anthropogenic forcing to HDE decadal changes over China. Anthropogenic forcing changes can explain 60%–70% of the observed decadal changes,suggesting an important anthropogenic influence on HDE changes over China across the mid-1990s. Single-forcing experiments indicate that the increase in greenhouse gas(GHG) concentrations dominates the simulated decadal changes,increasing the frequency and duration of HDEs throughout China. The change in anthropogenic aerosol(AA) emissions significantly decreases the frequency and duration of HDEs over SEC and NC, but the magnitude of the decrease is much smaller than the increase induced by GHGs. The changes in HDEs in response to anthropogenic forcing are mainly due to the response of climatological mean surface air temperatures. The contributions from changes in variability and changes in climatological mean soil moisture and evapotranspiration are relatively small. The physical processes associated with the response of HDEs to GHG and AA changes are also revealed.
基金The work was supported by the National Natural Science Foundation of China under grant No.69773029 and theNational '863' High-
文摘Concurrency control has always been one of the most important issues in the design of synchronous groupware systems with fully-replicated architecture. An ideal strate- gy should be able to support natural and flexible human-to-computer and human-to-human interactions while maintaining the consistency of the system. This paper summarizes previ- ous researches on this topic and points out the deficiencies of the existing results. A novel semantics-based concurrency control framework, oodOPT is proposed. The main idea of the framework is to resolve conflicts by utilizing semantics of the operations and the accessed data objects. With this approach, complexities in concurrency control are shifted completely from application developers to the framework. Conflicts among operations on objects with different semantics and the strategies resolving these conflicts are analyzed. After describing the algo- rithm in full detail, the discussion ends up with a comparison with other related work and some considerations for open problems.
基金Supported by the National Basic Research Program of China(973 Program)(2014CB340601)。
文摘Rust is a system-level programming language that provides thread and memory safety guarantee through a suite of static compiler checking rules and prevents segmentation errors.However,since compiler checking is too strict to confine Rust's programmability,the developers prefer to use the keyword"unsafe"to bypass compiler checking,through which the caller could interact with OS directly.Unfortunately,the code block with"unsafe"would easily lead to some serious bugs such as memory safety violation,race condition and so on.In this paper,to verify memory and concurrency safety of Rust programs,we present RSMC(Safety Model Checker for Rust),a tool based on Smack to detect concurrency bugs and memory safety errors in Rust programs,in which we combine concurrency primitives model checking and memory boundary model checking.RSMC,with an assertion generator,can automatically insert assertions and requires no programmer annotations to verify Rust programs.We evaluate RSMC on two categories of Rust programs,and the result shows that RSMC can effectively find concurrency bugs and memory safety errors in vulnerable Rust programs,which include unsafe code.