2004
DOI: 10.1023/b:time.0000045317.37980.a5
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Databases and Data Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
115
0
3

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 133 publications
(120 citation statements)
references
References 129 publications
0
115
0
3
Order By: Relevance
“…The database is assumed to be maintained in the main memory. This assumption is valid for most real-time systems for event monitoring as the number of data objects to be maintained in the databases is usually not large [25].…”
Section: System Model and Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…The database is assumed to be maintained in the main memory. This assumption is valid for most real-time systems for event monitoring as the number of data objects to be maintained in the databases is usually not large [25].…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…To maintain the temporal validity of a real-time data object, new data values are generated from a sensor periodically [16,20]. Once generated, the new value is sent as an update job to a real-time controller to be installed into a real-time database for refreshing the corresponding data object maintained in the database [25]. How to generate and schedule the update transactions to maintain the temporal validity of the set of real-time data objects in a real-time database has been a hot research topic and various fixed and dynamic priority scheduling algorithms have been proposed [12,32,36].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The middleware will obviously use services offered by the fundamental operating system. Because this creates resources like files and communications ports from lower-level components, it obtains the liability for as long as ways to organize access to them [4]. Furthermore, Access control is apprehensive with shaping the permissible actions of legal users; mediate each effort by a user to access a part of data in the system [5].…”
Section: Introductionmentioning
confidence: 99%
“…In previous years, a lot of work has been done on RTDBS [8] [9], which are systems that are designed to manage applications where it is desirable to execute transactions timely using fresh and precise data [1]. Since the workload in this systems is unpredictable, the system may become quickly overloaded, leading to the decrease of the well-known RT-DBS performance criterion (the number of transactions that complete before their deadline).…”
Section: Introductionmentioning
confidence: 99%