• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,456
Next 10 →

Table 1. Transaction

in Advanced Transactions in Component-Based Software Architectures
by Marek Prochazka 2002
"... In PAGE 40: ... Table1 : EJB Transaction attribute values For example, if a method m is associated with the RequiresNew transaction attribute, m is always invoked in the scope of a newly-created container-demarcated transaction (referred to as container-managed transaction in both EJB and CCM, also declarative transaction in EJB, and automatic transaction in COM+) tx2. If a client invokes m with no transaction context, the container automatically starts a new container-demarcated transaction tx2 before delegating a method call to m.... ..."
Cited by 10

Table 1. Transaction

in Advanced Transactions in Component-Based Software Architectures
by Marek Procházka 2002
"... In PAGE 40: ... Table1 : EJB Transaction attribute values For example, if a method m is associated with the RequiresNew transaction attribute, m is always invoked in the scope of a newly-created container-demarcated transaction (referred to as container-managed transaction in both EJB and CCM, also declarative transaction in EJB, and automatic transaction in COM+) tx2. If a client invokes m with no transaction context, the container automatically starts a new container-demarcated transaction tx2 before delegating a method call to m.... ..."
Cited by 10

Table 1: Transaction Association

in unknown title
by unknown authors 1999
"... In PAGE 17: ...start method to be invoked on a connection that is currently associated with a different transaction. Table1 : Transaction Association XAResource Methods XAResource Transaction States Not Associated T0 Associated T1 Association Suspended T2 start() T1 start (TMRESUME)... ..."

Table 2: Transaction identification

in ABSTRACT Towards User-Centric Metrics for Denial-Of-Service Measurement ∗
by Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter Reiher, Roshan Thomas, Wei-min Yao, Stephen Schwab
"... In PAGE 4: ... Instead, traffic trace analy- sis is imperfect in transaction identification, but is more extensible and portable. Table2 shows how we identify transactions in the trace data. For... ..."

Table 1: Transaction Association

in unknown title
by unknown authors 1999
"... In PAGE 18: ...1. Then a different global transaction xid2 is associated with r1. Meanwhile, the transaction manager may start the two phase commit process for xid1 using r1 or any other transactional resource connected to the same resource manager. The resource start (TMJOIN) T1 end (TMSUSPEND) T2 end (TMFAIL) T0 T0 end (TMSUCCESS) T0 T0 recover() T0 T1 T2 Table1 : Transaction Association XAResource Methods XAResource Transaction States Not Associated T0 Associated T1 Association Suspended... ..."

Table 1: Transaction mapping

in Global Bus Design of a Bus-Based COMA Multiprocessor DICE
by Gyungho Lee, Bland Quattlebaum , Sangyeun Cho, Larry Kinney 1996
"... In PAGE 5: ... This greatly simplifies the bus interface design by providing a proven implementation of the profile. Table1 shows the transaction mapping between those proposed to support the DICE multiprocessor and those pro- vided by the FB+. To enhance the capabilities of the ba- sic bus transactions, the IEEE 896.... In PAGE 8: ... 4.5 Synchronization, I/O transactions, and inter- rupt support The TAS transaction is defined (in Table1 ) as a read block followed by a write partial to implement synchro- nization instructions such as test-and-set. The memory lo- cation being accessed must remain under the control of a single processor for the duration of the read-modify-write cycle.... ..."
Cited by 2

Table 1: Transaction Values

in Security Evaluation of the disposable OV-chipkaart v1.6
by unknown authors 2007
"... In PAGE 9: ... By reading the contents of various cards before and after various transactions, it was possible to determine the use of most bits in these 8 bytes. Table1 shows the various values. The first 5 bits serve an unknown purpose.... ..."

Table I. Sample Transactions

in Efficient Adaptive-Support Association Rule Mining for Recommender Systems
by Weiyang Lin, Sergio A. Alvarez 2002
Cited by 51

Table 8 Returns of the Different MA Strategies for the LITIN-10 Index Portfolio type MA 10 MA 50 MA 100 MA 200 Long-cash 98.14% 136.94% 111.87% 137.05% Long short 77.68% 162.08% 81.37% 125.48%

in “The Evaluation of the Lithuanian Stock Market with the Weak-form Market Efficiency Hypothesis” Written by:
by Gediminas Milieska
"... In PAGE 5: ...able 7 Returns of the Different MA Strategies for the LITIN-G Index.................................44 Table8 Returns of the Different MA Strategies for the LITIN-10 Index .... ..."

Table 3. Protocol Transactions

in A Customized MVA Model for ILP Multiprocessors
by Daniel Sorin, Mary K. Vernon, Vijay S. Pai, Sarita V. Adve, David A. Wood 1998
"... In PAGE 3: ... Other requests (writes, upgrades, writebacks, invalidates, and acknowledgments) are asynchronous. Table3 defines all of the memory system transactions. A key question in developing the analytic model is how to compute throughput as a function of the dynamically changing number of outstanding memory requests that can be issued before the processor must stall waiting for data to return from memory.... In PAGE 6: ... For many terms, there is a subscript of loc or rem to indicate whether the action is at the local node or a remote node. The variable y denotes the transaction type (see Table3 ). The variable x denotes the type of message (request or data) that is on the bus or at the NI.... ..."
Cited by 1
Next 10 →
Results 11 - 20 of 3,456
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University