1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
10

Examine the efficiency the various recovery algorithms used in deadlock handling

Computers and Technology
1 answer:
sineoko [7]3 years ago
4 0

Solution:

The process of transaction can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g; two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture, the deadlock problem becomes even worse because multiple transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a gl obal transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes.

This is the required answer.

You might be interested in
You want to substitute one word with another throughout your
Hitman42 [59]
I’m pretty sure it’s “Find and paste”
8 0
3 years ago
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
3 years ago
Read 2 more answers
using a for loop, write a program that prints out the decimal equivalents of 1/2, 1/3, 1/4,..., 1/10.
ValentinkaMS [17]
In python:

##Specifies the range that the variable 'number' should change within
for number in range(2,10):
##Prints the decimal equivalent of each fraction
    print(1 / number)
5 0
3 years ago
Hope wants to add a third use at the end of her
Arisa [49]

Answer: Put her insertion point at the end of the item 2b.

Press the enter key.

Explanation:

6 0
3 years ago
Which one of these choices best describes what exec() does:a) It replaces the current process with a new oneb) It executes a new
Dimas [21]

Answer:

Option b It executes a new process, which runs at the same time as the parent

Explanation:

The exec is one of the Java Runtime methods which is used to create a new process and run it as an separate process. Exec method executes the string command that we place inside the bracket. For example,

Process proc = Runtime.getRuntime().exec("Notepad.exe");

The statement above offers a convenient way to open the another computer software such as Notepad when running the program.  

3 0
3 years ago
Other questions:
  • 3.
    13·1 answer
  • What office application has animations on the home ribbon?
    7·2 answers
  • Wich command converts a number to a string​
    11·1 answer
  • Give an example of an app, website, or a game that used addictive design. Describe three features of addictive design it uses.
    11·2 answers
  • Are one of the greatest features of Photoshop that allow nondestructive editing of images.
    6·1 answer
  • Write a Python program that reads the CSV file, compares the population estimates of every row for 2010 and 2017 and computes th
    10·1 answer
  • Which of the following code segments could be used to skip the first two characters of an input line (they may or may not be whi
    13·1 answer
  • Which best describes a difference between transcription and DNA replication
    8·2 answers
  • Servlet session and JSP session have different abilities.TrueFalse
    9·1 answer
  • Where in the Formula tab on the ribbon would you find the Use in Formula function?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!