Client-server database systems based on a data shipping model can exploit client memory resources by caching copies of data items across transaction boundaries. Caching reduces the need to obtain data from servers or other sites on the network. In order to ensure that such caching does not result in the violation of transaction semantics, a transactional cache consistency maintenance algorithm is required. Many such algorithms have been proposed in the literature and, as all provide the same functionality, performance is a primary concern in choosing among them. In this article we present a taxonomy that describes the design space for transactional cache consistency maintenance algorithms and show how proposed algorithms relate to one anoth...
With web caching and cache-related services like CDNs and edge services playing an increasingly sign...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
Client-server database systems based on a page server model can exploit client memory resources by c...
http://www.usenix.org/events/osdi10/tech/techAbstracts.html#PortsDistributed in-memory application d...
In-memory read-only caches are widely used in cloud in-frastructure to reduce access latency and to ...
In a data-shipping database system, dataitems are retrieved from the server machines,cached and proc...
This paper presents a detailed performance study of the associative caching scheme proposed in [11]....
The growth of the World Wide Web (WWW or Web) and its increasing use in all types of business have c...
Research on algorithms and concepts regarding memory-based data caching can help solve the performan...
PhD ThesisData-shipping systems are commonly used in client-server object-oriented databases. This i...
The caching of data and/or locks at client workstations is an effective technique for improving the ...
With web caching and cache-related services like CDNs and edge services playing an increasingly sign...
Since the early nineties transactional cache protocols have been intensively studied in the co...
ing with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute t...
With web caching and cache-related services like CDNs and edge services playing an increasingly sign...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
Client-server database systems based on a page server model can exploit client memory resources by c...
http://www.usenix.org/events/osdi10/tech/techAbstracts.html#PortsDistributed in-memory application d...
In-memory read-only caches are widely used in cloud in-frastructure to reduce access latency and to ...
In a data-shipping database system, dataitems are retrieved from the server machines,cached and proc...
This paper presents a detailed performance study of the associative caching scheme proposed in [11]....
The growth of the World Wide Web (WWW or Web) and its increasing use in all types of business have c...
Research on algorithms and concepts regarding memory-based data caching can help solve the performan...
PhD ThesisData-shipping systems are commonly used in client-server object-oriented databases. This i...
The caching of data and/or locks at client workstations is an effective technique for improving the ...
With web caching and cache-related services like CDNs and edge services playing an increasingly sign...
Since the early nineties transactional cache protocols have been intensively studied in the co...
ing with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute t...
With web caching and cache-related services like CDNs and edge services playing an increasingly sign...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...