滔滔不绝的人 发表于 2025-3-23 10:50:07

http://reply.papertrans.cn/23/2274/227329/227329_11.png

缓和 发表于 2025-3-23 14:30:44

Modeling a Page Server DBMS,The performance analyses that are presented in the following chapters were obtained using a flexible and detailed simulation model. This chapter describes how the model captures the client-server execution, database, physical resources, and workloads of a page server DBMS, and discusses the methodology used during the experiments.

NAG 发表于 2025-3-23 18:22:08

Global Memory Management,The preceding two chapters were concerned with exploiting client memory by caching in order to reduce dependence on the server. This chapter takes client caching a step further by treating the aggregate memory of the clients in the system as a global cache..

爱管闲事 发表于 2025-3-24 01:05:05

Client Data Caching978-1-4613-1363-2Series ISSN 0893-3405

Disk199 发表于 2025-3-24 03:35:36

G. Jariwalla MB, BCh (Wales), MCRPforces have had a profound effect on the requirements for Database Management Systems (DBMSs) and hence, on the way such systems are designed and built. The widespread adoption of . architectures has made distributed computing the conventional mode of operation for many application domains. At the s

创新 发表于 2025-3-24 10:23:28

G. Jariwalla MB, BCh (Wales), MCRPnd data requests to the server as queries or as requests for specific data items. Systems of the former type are referred to as . systems and those of the latter type are referred to as .. These two alternatives are shown in Figure 2.1. In query-shipping systems, clients send a query to the server;

Mumble 发表于 2025-3-24 11:45:02

http://reply.papertrans.cn/23/2274/227329/227329_17.png

头脑冷静 发表于 2025-3-24 15:44:46

A. van Nieuwstadt,P. Strayer,C. Holzhauerbased Two-Phase Locking (S2PL), Optimistic Two-Phase Locking (O2PL), and Callback Locking (CB). Seven algorithms are studied under a range of workloads and system configurations. In addition to measuring the performance of these specific algorithms, the experiments presented here also provide insigh

思考 发表于 2025-3-24 19:50:53

A. van Nieuwstadt,P. Strayer,C. Holzhauerin Section 2.1, most current ODBMSs exploit client . resources through the use of a . architecture, which enables much of the work of data manipulation to be performed at clients. Furthermore, as described in the preceding chapters, systems can exploit client . resources through the use of intra- an

异端邪说2 发表于 2025-3-25 01:26:48

http://reply.papertrans.cn/23/2274/227329/227329_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Client Data Caching; A Foundation for Hig Michael J. Franklin Book 1996 Kluwer Academic Publishers 1996 DBMS.algorithms.architecture.archit