2015
DOI: 10.7763/ijmo.2015.v5.429
|View full text |Cite
|
Sign up to set email alerts
|

Soft Computing for Database Deadlock Resolution

Abstract: Abstract-Distributed nature of transactions arising at different sites and needing resources from diverse locations pose various operational problems, such as deadlocks, concurrency and data recovery. A deadlock may occur when a transaction enters into wait state that request resource from other blocked transactions. Deadlock detection and resolving is very difficult in a distributed database system because no controller has complete and current information about the system and data dependencies. In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(15 citation statements)
references
References 7 publications
(12 reference statements)
0
15
0
Order By: Relevance
“…These approaches include (a) prevention, (b) avoidance, (c) detection and resolution of a deadlock. Deadlock prevention protocols guarantee a deadlock-free condition [158] by structuring a database system to prevent at least one of the conditions necessary for a deadlock to occur [30] (i.e., "mutual exclusion, hold and wait, no preemption and circular wait" [139]). These algorithms postpone a transaction execution in case of the existence of one of these conditions; the prevented transaction must restart at a later time.…”
Section: Deadlock Handlingmentioning
confidence: 99%
See 4 more Smart Citations
“…These approaches include (a) prevention, (b) avoidance, (c) detection and resolution of a deadlock. Deadlock prevention protocols guarantee a deadlock-free condition [158] by structuring a database system to prevent at least one of the conditions necessary for a deadlock to occur [30] (i.e., "mutual exclusion, hold and wait, no preemption and circular wait" [139]). These algorithms postpone a transaction execution in case of the existence of one of these conditions; the prevented transaction must restart at a later time.…”
Section: Deadlock Handlingmentioning
confidence: 99%
“…Deadlock avoidance, on the other hand, reduces the system overhead and hence is preferred over the prevention protocols [158]. Deadlock avoidance protocols attempt to predict deadlocks at the time a resource is requested by a transaction and react to the request accordingly to avoid deadlock [30]. Each request is analyzed dynamically in order to achieve efficient transaction execution.…”
Section: Deadlock Handlingmentioning
confidence: 99%
See 3 more Smart Citations