Approaches for Scheduling of Triggered Transactions in Real-time Active Database Systems

Kam-yiu Lam, Tony S.H. Lee

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

Abstract

A real-time active database system (RTADBS) has to provide capabilities for timely trigger of time constrained transactions and at the same time to process them, concurrently with others transactions, in a real-time manner. Mostly, triggered transactions are critical transactions. It is highly important to commit them. Committing a triggered transaction requires meeting the deadline constraints of its triggering transaction and also the data deadlines of its accessed temporal data objects. However, the generations of triggered transactions decrease the predictability of the system as they increase the system workload and the probability of data conflicts. The authors propose different approaches for assigning deadlines and priorities to the triggered transactions with the objectives to satisfy the timing requirements of the triggered transactions especially for the more critical ones. The performance of the new approaches and their relationships with different coupling modes have been studied using simulation.
Original languageEnglish
Title of host publicationProceedings - 24th EUROMICRO Conference
PublisherIEEE
Pages476-483
ISBN (Print)0-8186-8646-4
DOIs
Publication statusPublished - Aug 1998
Event24th EUROMICRO Conference, EURMIC 1998 - Vasteras, Sweden
Duration: 25 Aug 199827 Aug 1998

Publication series

NameProceedings - EUROMICRO Conference, EURMIC
Volume1

Conference

Conference24th EUROMICRO Conference, EURMIC 1998
PlaceSweden
CityVasteras
Period25/08/9827/08/98

Research Keywords

  • coupling modes
  • priority and deadline assignment
  • real-time active database systems
  • scheduling
  • triggering of transactions

Fingerprint

Dive into the research topics of 'Approaches for Scheduling of Triggered Transactions in Real-time Active Database Systems'. Together they form a unique fingerprint.

Cite this