- dvtk大小:104MBdvtk-dicom协议测试辅助工具dvtk-dicom协议测试辅助工具0 302浏览会员免费
- unet大小:830MBUnet图像分割,已标注Unet图像分割,已标注0 133浏览会员免费
- python大小:2KB让你学会如何使用python中的tkinter和pickle 非常简单,只要有手就会 这里面有注释,方便看懂 教你学会写一个属于自己的python GUI登录窗口 这里的代码调理清晰, 有助与你的学习 压缩包可以让你快速下载 点击一下,一个.py的文件就出来了 我不经感叹一句:“压缩包真方便呀!” 双击一下,就成功的打开了这个.py文件 再点一下运行,一个python GUI 登录窗口就出现了 试一试,真不错呀!让你学会如何使用python中的tkinter和pickle 非常简单,只要有手就会 这里面有注释,方便看懂 教你学会写一个属于自己的python GUI登录窗口 这里的代码调理清晰, 有助与你的学习 压缩包可以让你快速下载 点击一下,一个.py的文件就出来了 我不经感叹一句:“压缩包真方便呀!” 双击一下,就成功的打开了这个.py文件 再点一下运行,一个python GUI 登录窗口就出现了 试一试,真不错呀!0 99浏览会员免费
- 写真网站源码大小:33MB这程序本人实测搭建成功,百分百可以用的,属于WordPress,已经集成好了模板,而且这模板功能非常强大,专门用于下载站的,会员中心和开通会员这些的都是有的。 你也可以对网站进行改造,做源码站和素材站都不在话下,写真站只是一个演示而已,具体做什么类型的网站大家自己去弄。 PHP设置7.0 宝塔配置 伪静态WordPress 配置数据库 文件路径 /wp-config.php 后台账号密码 admin123 admin123这程序本人实测搭建成功,百分百可以用的,属于WordPress,已经集成好了模板,而且这模板功能非常强大,专门用于下载站的,会员中心和开通会员这些的都是有的。 你也可以对网站进行改造,做源码站和素材站都不在话下,写真站只是一个演示而已,具体做什么类型的网站大家自己去弄。 PHP设置7.0 宝塔配置 伪静态WordPress 配置数据库 文件路径 /wp-config.php 后台账号密码 admin123 admin1230 1511浏览会员免费
- ZIP大小:6MB此模板使用拼图大前端框架以及采用优秀板子组装而成, 用于新闻,博客非常不错。 安装教程: 1.自行安装zblog好后 2.后台地址:http://你的域名/zb_system/login.php 3.主题管理-选择上传zba文件-后台启用此模板使用拼图大前端框架以及采用优秀板子组装而成, 用于新闻,博客非常不错。 安装教程: 1.自行安装zblog好后 2.后台地址:http://你的域名/zb_system/login.php 3.主题管理-选择上传zba文件-后台启用0 49浏览会员免费
- 达梦数据库大小:707MB达梦数据库的下载压缩包解压压缩包双击EXE文件即可下载达梦数据库的下载压缩包解压压缩包双击EXE文件即可下载0 95浏览会员免费
- 大数据大小:323KB山东大数据考试。。。。。山东大数据考试。。。。。0 270浏览会员免费
- Hadoop大小:818MBhadoop 源代码归档hadoop 源代码归档0 27浏览会员免费
- java大小:2MB资料对应的视频教程https://www.bilibili.com/video/BV1ia411K7St/资料对应的视频教程https://www.bilibili.com/video/BV1ia411K7St/0 37浏览会员免费
- DbVisualizer大小:126MBDbVisualizer 12.1.5DbVisualizer 12.1.50 107浏览会员免费
- 芯片解密大小:10KBSTM8S0系列 STM8S1系列 STM8S2系列 STM8L0系列 STM8L1系列 CR8F6系列 STM8AF系列 STM8AH系列 STM8AL31系列 解密成功STM8S0系列 STM8S1系列 STM8S2系列 STM8L0系列 STM8L1系列 CR8F6系列 STM8AF系列 STM8AH系列 STM8AL31系列 解密成功1 107浏览会员免费
- 反编译工具大小:901KB人大金仓国产数据库集成驱动jar包人大金仓国产数据库集成驱动jar包0 374浏览会员免费
- maxmind大小:34MB包含国家地理IP数据库和城市地理IP数据库包含国家地理IP数据库和城市地理IP数据库0 149浏览会员免费
- gbase大小:442MBGBaseDataStudio_8.5.6.0安装包(含windows版本、linux版本)GBaseDataStudio_8.5.6.0安装包(含windows版本、linux版本)5 1364浏览会员免费
- 狂龙软件大小:637KB狂龙sql语句批量更新辅助工具v2.0是一款应用于访问和处理数据库标准的计算机语言辅助工具,主要针对IN操作符在Where子句中多值辅助、And和Or运算符多条件记录过滤辅助等。除了应用于数据库层面,大家也可以扩展思维应用于其他场景。希望此工具成为大家的好帮手。欢迎有需要的朋友下载使用。 2022-8-12更新说明: 1).对于字符中的空格不做处理。 2).新增内容替换功能。 3).新增快捷操作功能。 4).处理程序内部已知bug。狂龙sql语句批量更新辅助工具v2.0是一款应用于访问和处理数据库标准的计算机语言辅助工具,主要针对IN操作符在Where子句中多值辅助、And和Or运算符多条件记录过滤辅助等。除了应用于数据库层面,大家也可以扩展思维应用于其他场景。希望此工具成为大家的好帮手。欢迎有需要的朋友下载使用。 2022-8-12更新说明: 1).对于字符中的空格不做处理。 2).新增内容替换功能。 3).新增快捷操作功能。 4).处理程序内部已知bug。0 72浏览会员免费
- LogAnalyzer大小:346MBManageEngine EventLog Analyzer 12.2.1ManageEngine EventLog Analyzer 12.2.14 677浏览会员免费
- 全球国旗大小:1MB世界所有国家的国旗 SVG 图标 共266国家 1X1和 4x3 格式 文件命名为 国家缩写 (ad.svg)世界所有国家的国旗 SVG 图标 共266国家 1X1和 4x3 格式 文件命名为 国家缩写 (ad.svg)0 687浏览会员免费
- Netty大小:4KB在目录com.zhao中,也可以自己修改包 使用之前需要配置pom.xml <dependency> <groupId>junit</groupId> <artifactId>junit</artifactId> <version>4.6</version> <scope>test</scope> </dependency> <!-- https://mvnrepository.com/artifact/io.netty/netty-all --> <dependency> <groupId>io.netty</groupId> <artifactId>netty-all</artifactId> <version>4.1.50.Final</version> </dependency>在目录com.zhao中,也可以自己修改包 使用之前需要配置pom.xml <dependency> <groupId>junit</groupId> <artifactId>junit</artifactId> <version>4.6</version> <scope>test</scope> </dependency> <!-- https://mvnrepository.com/artifact/io.netty/netty-all --> <dependency> <groupId>io.netty</groupId> <artifactId>netty-all</artifactId> <version>4.1.50.Final</version> </dependency>0 226浏览会员免费
- 安川伺服大小:372KBYaskawa_SGDV-E1_CoE_rev5.00,rev5.04,rev6.00,rev6.03,rev7.00,rev7.01,Yaskawa_SGDV-E5_CoE_rev5.00,rev5.04,rev6.00,rev6.03,rev7.00,rev7.01,Yaskawa_SGDV-E1_CoE_rev5.00,rev5.04,rev6.00,rev6.03,rev7.00,rev7.01,Yaskawa_SGDV-E5_CoE_rev5.00,rev5.04,rev6.00,rev6.03,rev7.00,rev7.01,0 684浏览会员免费
- elasticsearch大小:8MBIK 中文分词器,对应 Elasticsearch-7.8.0 版本IK 中文分词器,对应 Elasticsearch-7.8.0 版本0 217浏览会员免费
- sqldeveloper大小:8MBsql developer hive连接java包sql developer hive连接java包0 70浏览会员免费
- DM数据库大小:788MBDM数据库安装包资源文件DM数据库安装包资源文件0 733浏览会员免费
- IK分词器大小:4MBelasticsearch-analysis-ik-7.2.0.zipelasticsearch-analysis-ik-7.2.0.zip1 271浏览会员免费
- elasticsearch大小:457KBelasticsearch-head 是一种便捷查询操作 elasticsearch 的可视化工具,具备集群管理、增删查改等功能。elasticsearch-head 是一种便捷查询操作 elasticsearch 的可视化工具,具备集群管理、增删查改等功能。0 74浏览会员免费
- shp数据大小:403KB滁州市区域边界shp数据,可以用于arcgis地图制作。滁州市区域边界shp数据,可以用于arcgis地图制作。0 91浏览会员免费
- 行政边界大小:70MB2019 全国省、市、县界矢量图,下载自国家基础地理信息中心。2019 全国省、市、县界矢量图,下载自国家基础地理信息中心。0 65浏览会员免费
- 瀚高(highgo)大小:206MB瀚高(highgo)4.5.7数据库rpm安装包瀚高(highgo)4.5.7数据库rpm安装包5 483浏览会员免费
- clickhouse大小:120MBclickhouse安装包和教程提供给大家 //卸载原来的clickhouse服务 yum remove -y clickhouse-common-static yum remove -y clickhouse-server-common rm -rf /var/lib/clickhouse rm -rf /etc/clickhouse-* rm -rf /var/log/clickhouse-server //按顺序安装clickhouse组件 rpm -ivh clickhouse-common-static-21.3.4.25-2.x86_64.rpm rpm -ivh clickhouse-server-21.3.4.25-2.noarch.rpm rpm -ivh clickhouse-client-21.3.4.25-2.noarch.rpm 详情可以看下我的这篇文章 Linux系统卸载,安装,升级,迁移clickHouse数据库 https://blog.csdn.net/weixin_56567361/article/details/125994946clickhouse安装包和教程提供给大家 //卸载原来的clickhouse服务 yum remove -y clickhouse-common-static yum remove -y clickhouse-server-common rm -rf /var/lib/clickhouse rm -rf /etc/clickhouse-* rm -rf /var/log/clickhouse-server //按顺序安装clickhouse组件 rpm -ivh clickhouse-common-static-21.3.4.25-2.x86_64.rpm rpm -ivh clickhouse-server-21.3.4.25-2.noarch.rpm rpm -ivh clickhouse-client-21.3.4.25-2.noarch.rpm 详情可以看下我的这篇文章 Linux系统卸载,安装,升级,迁移clickHouse数据库 https://blog.csdn.net/weixin_56567361/article/details/1259949460 527浏览会员免费
- Homer微电网分析软件大小:198MBHOMER Energy公司的HOMER Pro微电网软件是优化微电网设计的全球标准,适用于从乡村电力和岛屿公用事业到联网校园和军事基地的所有领域。HOMER(多能源混合优化模型)最初由国家可再生能源实验室开发的,并由HOMER Energy公司扩展功能和分销,它将三种强大的工具嵌套在一个软件产品中,使得工程和经济可以并行工作。 HOMER的核心是一个仿真模型。它试图模拟一个可行的系统,为您希望考虑的所有可能提供设备组合。根据您设置问题的方式,HOMER可以模拟数百甚至数千个系统。 HOMER模拟了混合微电网一整年的运行,时间步长从一分钟到一小时不等。 HOMER在一次运行中检查所有可能的系统类型组合,然后根据所选择的优化变量对系统进行排序。HOMER Pro采用了新优化算法,大大简化了为微电网或其他分布式发电系统确定最低成本选项的设计过程。HOMER Optimizer是一种专有的“无衍生”优化算法,专门为在HOMER中工作而设计。 HOMER支持用户可以随意提出很多问题,因为您无法控制系统的所有方面,而且如果不运行数百或数千次模拟并比较结果,您就无法知道特定变量或选项的重要性。HOMER Energy公司的HOMER Pro微电网软件是优化微电网设计的全球标准,适用于从乡村电力和岛屿公用事业到联网校园和军事基地的所有领域。HOMER(多能源混合优化模型)最初由国家可再生能源实验室开发的,并由HOMER Energy公司扩展功能和分销,它将三种强大的工具嵌套在一个软件产品中,使得工程和经济可以并行工作。 HOMER的核心是一个仿真模型。它试图模拟一个可行的系统,为您希望考虑的所有可能提供设备组合。根据您设置问题的方式,HOMER可以模拟数百甚至数千个系统。 HOMER模拟了混合微电网一整年的运行,时间步长从一分钟到一小时不等。 HOMER在一次运行中检查所有可能的系统类型组合,然后根据所选择的优化变量对系统进行排序。HOMER Pro采用了新优化算法,大大简化了为微电网或其他分布式发电系统确定最低成本选项的设计过程。HOMER Optimizer是一种专有的“无衍生”优化算法,专门为在HOMER中工作而设计。 HOMER支持用户可以随意提出很多问题,因为您无法控制系统的所有方面,而且如果不运行数百或数千次模拟并比较结果,您就无法知道特定变量或选项的重要性。0 523浏览会员免费
- FC小霸王大小:560MBFC小霸王4000余款游戏整合版.zipFC小霸王4000余款游戏整合版.zip5 5599浏览会员免费
- MyDockfinder大小:332MBMyDockfinder的所有壁纸.zip,教程在https://blog.csdn.net/zmy991018ok/article/details/125934675MyDockfinder的所有壁纸.zip,教程在https://blog.csdn.net/zmy991018ok/article/details/1259346750 1302浏览会员免费
- ZIP大小:11MB录屏软件安装视频.zip,具体教程在: https://blog.csdn.net/zmy991018ok/article/details/125869384?csdn_share_tail=%7B%22type%22%3A%22blog%22%2C%22rType%22%3A%22article%22%2C%22rId%22%3A%22125869384%22%2C%22source%22%3A%22zmy991018ok%22%7D&ctrtid=vK5nz录屏软件安装视频.zip,具体教程在: https://blog.csdn.net/zmy991018ok/article/details/125869384?csdn_share_tail=%7B%22type%22%3A%22blog%22%2C%22rType%22%3A%22article%22%2C%22rId%22%3A%22125869384%22%2C%22source%22%3A%22zmy991018ok%22%7D&ctrtid=vK5nz0 247浏览会员免费
- codeblocks大小:144MBcodeblocks:在虚拟机中的编程软件codeblocks:在虚拟机中的编程软件0 136浏览会员免费
- 桌面破坏王大小:2MB桌面破坏王,可以对桌面涂鸦的软件桌面破坏王,可以对桌面涂鸦的软件0 81浏览会员免费
- 机器学习大小:77MBBacterial leaf blight Brown spot Leaf smut 里面包含这三种水稻病害叶片白底图,可以添加数据量Bacterial leaf blight Brown spot Leaf smut 里面包含这三种水稻病害叶片白底图,可以添加数据量5 391浏览会员免费
- 植物病害大小:412MB植物叶片病害数据集 含4500多张植物叶片病害数据集 含4500多张5 1912浏览会员免费
- Clickhouse大小:9MB编译好的 Clickhousereader Clickhousewriter 插件包 放在 datax\plugin 目录下 即可运行编译好的 Clickhousereader Clickhousewriter 插件包 放在 datax\plugin 目录下 即可运行0 1059浏览会员免费
- 大学名单大小:125KB更新截至2022年5月31日,全国高等学校共计3013所, 其中:普通高等学校2759所,含本科院校1270所、高职(专科)院校1489所;成人高等学校254所。 本名单未包含港澳台地区高等学校。 名称,代码 ,从属部门,所在城市,所属层级;更新截至2022年5月31日,全国高等学校共计3013所, 其中:普通高等学校2759所,含本科院校1270所、高职(专科)院校1489所;成人高等学校254所。 本名单未包含港澳台地区高等学校。 名称,代码 ,从属部门,所在城市,所属层级;0 108浏览会员免费
- 数据库大小:341MB国产数据库 达梦数据库管理工具国产数据库 达梦数据库管理工具0 3289浏览会员免费
- 全球地区大小:99KB全球国家、省/州、城市的数据库 xml格式,中英文两个文件全球国家、省/州、城市的数据库 xml格式,中英文两个文件4 1134浏览会员免费
- 地理信息編碼算法大小:63KBGeohash算法就是将经纬度编码,将二维变一维,给地址位置分区的一种算法 此檔案為C語言實現 函式庫使用介紹: 1)編碼 char* geohash_encode(double lat, double lng, int precision); 以所需精度獲取緯度和經度並返回正確的哈希值。如果精度 < 0 或精度 > 20,將使用默認值 6。 2)解碼 GeoCoord geohash_decode(char* hash); 生成一個分配的 GeoCoord 結構,其中包含從 geohash 解碼的緯度和經度。GeoCoord 還提供了 geohash 的邊界框(北、東、南、西)。 3)鄰居 char** geohash_neighbors(char* hash); 使用在 hash 處聲明的邊界框併計算 8 個相鄰框。下面顯示了一個示例。 ezefx ezs48 ezs49 ezefr ezs42 ezs43 ezefp ezs40 ezs41 返回的值是一個長度為 8 的 char* 數組。值的相鄰位置如下所示,每個框代表數組的索引。 7 0 1 6 * 2 5 4 3Geohash算法就是将经纬度编码,将二维变一维,给地址位置分区的一种算法 此檔案為C語言實現 函式庫使用介紹: 1)編碼 char* geohash_encode(double lat, double lng, int precision); 以所需精度獲取緯度和經度並返回正確的哈希值。如果精度 < 0 或精度 > 20,將使用默認值 6。 2)解碼 GeoCoord geohash_decode(char* hash); 生成一個分配的 GeoCoord 結構,其中包含從 geohash 解碼的緯度和經度。GeoCoord 還提供了 geohash 的邊界框(北、東、南、西)。 3)鄰居 char** geohash_neighbors(char* hash); 使用在 hash 處聲明的邊界框併計算 8 個相鄰框。下面顯示了一個示例。 ezefx ezs48 ezs49 ezefr ezs42 ezs43 ezefp ezs40 ezs41 返回的值是一個長度為 8 的 char* 數組。值的相鄰位置如下所示,每個框代表數組的索引。 7 0 1 6 * 2 5 4 30 102浏览会员免费
- 西门子大小:2MB西门子挑战杯单部六层 可供小白入门参考快速了解电梯的运行状态 谨慎传阅 本系统控制六层电梯, 采用集选控制方式。 为了完成设定的控制任务, 主要根据电梯输入/输出点数确定PLC 的机型,由FC块内梯形图编写。 根据电梯控制的要求, 电梯应具有上下行逻辑控制..开关门程序..数码管内呼外呼指示灯..抱闸刹车制动...楼层计数...电梯内呼反向登录..电梯同层不同时消灯..载重..电梯故障保护......西门子挑战杯单部六层 可供小白入门参考快速了解电梯的运行状态 谨慎传阅 本系统控制六层电梯, 采用集选控制方式。 为了完成设定的控制任务, 主要根据电梯输入/输出点数确定PLC 的机型,由FC块内梯形图编写。 根据电梯控制的要求, 电梯应具有上下行逻辑控制..开关门程序..数码管内呼外呼指示灯..抱闸刹车制动...楼层计数...电梯内呼反向登录..电梯同层不同时消灯..载重..电梯故障保护......0 3895浏览会员免费
- 数据库大小:1MBDB - The Volcano Optimizer Generator - Extensibility and Efficient Search.pdf Emerging database application domains demand not only new functionality but also high performance. To satisfy these two requirements, the Volcano project provides efficient, extensible tools for query and request processing, particularly for object-oriented and scientific database systems. One of these tools is a new optimizer generator. Data model, logical algebra, physical algebra, and optimization rules are ...DB - The Volcano Optimizer Generator - Extensibility and Efficient Search.pdf Emerging database application domains demand not only new functionality but also high performance. To satisfy these two requirements, the Volcano project provides efficient, extensible tools for query and request processing, particularly for object-oriented and scientific database systems. One of these tools is a new optimizer generator. Data model, logical algebra, physical algebra, and optimization rules are ...0 75浏览会员免费
- 数据库大小:44KBThis doc describes a new extensible query optimization framework that resolves many of the shortcomings of the EXODUS and Volcano optimizer generators. In addition to extensibility, dynamic programming, and memorization based on and extended from the EXODUS and Volcano prototypes, this new optimizer provides (i) manipulation of operator arguments using rules or functions, (ii) operators that are both logical and physical for predicates etc., (iii) schema-specific rules for materialized views,This doc describes a new extensible query optimization framework that resolves many of the shortcomings of the EXODUS and Volcano optimizer generators. In addition to extensibility, dynamic programming, and memorization based on and extended from the EXODUS and Volcano prototypes, this new optimizer provides (i) manipulation of operator arguments using rules or functions, (ii) operators that are both logical and physical for predicates etc., (iii) schema-specific rules for materialized views,5 61浏览会员免费
- 数据库大小:192KBDB - Access Path Selection in a Relational Database Management System.pdf In a high level query and data manipulation language such as SQL, requests are stated non-procedurally, without reference to access paths. This paper describes how System R chooses access paths for both simple (single relation) and complex queries (such as joins), given a user specification of desired data as a boolean expression of predicates. System R is an experimental database management system developed to carry ..DB - Access Path Selection in a Relational Database Management System.pdf In a high level query and data manipulation language such as SQL, requests are stated non-procedurally, without reference to access paths. This paper describes how System R chooses access paths for both simple (single relation) and complex queries (such as joins), given a user specification of desired data as a boolean expression of predicates. System R is an experimental database management system developed to carry ..5 51浏览会员免费
- 数据库大小:150KBSpanner is Google’s highly available global SQL database [CDE+12]. It manages replicated data at great scale, both in terms of size of data and volume of transactions. It assigns globally consistent real-time timestamps to every datum written to it, and clients can do globally consistent reads across the entire database without locking. This leads to three kinds of systems: CA, CP and AP, based on what letter you leave out. Note that you are not entitled to 2 of 3, and many systems have ...Spanner is Google’s highly available global SQL database [CDE+12]. It manages replicated data at great scale, both in terms of size of data and volume of transactions. It assigns globally consistent real-time timestamps to every datum written to it, and clients can do globally consistent reads across the entire database without locking. This leads to three kinds of systems: CA, CP and AP, based on what letter you leave out. Note that you are not entitled to 2 of 3, and many systems have ...5 83浏览会员免费
- 数据库大小:323KBSpanner is Google’s scalable, multi-version, globallydistributed, and synchronously-replicated database. It is the first system to distribute data at global scale and support externally-consistent distributed transactions. This paper describes how Spanner is structured, its feature set, the rationale underlying various design decisions, and a novel time API that exposes clock uncertainty. This API and its implementation are critical to supporting external consistency and a variety of powerful ...Spanner is Google’s scalable, multi-version, globallydistributed, and synchronously-replicated database. It is the first system to distribute data at global scale and support externally-consistent distributed transactions. This paper describes how Spanner is structured, its feature set, the rationale underlying various design decisions, and a novel time API that exposes clock uncertainty. This API and its implementation are critical to supporting external consistency and a variety of powerful ...0 61浏览会员免费
- 数据库大小:284KBThe ongoing and increasing interest in HTAP (Hybrid Transactional and Analytical Processing) systems documents the intense interest from data owners in simultaneously running transactional and analytical workloads over the same data set. Much of the reported work on HTAP has arisen in the context of “greenfield” systems, answering the question “if we could design a system for HTAP from scratch, what would it look like?” While there is great merit in such an approach, and a lot of valuable ...The ongoing and increasing interest in HTAP (Hybrid Transactional and Analytical Processing) systems documents the intense interest from data owners in simultaneously running transactional and analytical workloads over the same data set. Much of the reported work on HTAP has arisen in the context of “greenfield” systems, answering the question “if we could design a system for HTAP from scratch, what would it look like?” While there is great merit in such an approach, and a lot of valuable ...5 111浏览会员免费
- 数据库大小:408KBThe common wisdom is that distributed transactions do not scale. But what if distributed transactions could be made scalable using the next generation of networks and a redesign of distributed databases? There would be no need for developers anymore to worry about co-partitioning schemes to achieve decent performance. Application development would become easier as data placement would no longer determine how scalable an application is. Hardware provisioning would be simplified as the system ...The common wisdom is that distributed transactions do not scale. But what if distributed transactions could be made scalable using the next generation of networks and a redesign of distributed databases? There would be no need for developers anymore to worry about co-partitioning schemes to achieve decent performance. Application development would become easier as data placement would no longer determine how scalable an application is. Hardware provisioning would be simplified as the system ...5 319浏览会员免费
- 多目标优化大小:8KB带精英策略的非支配遗传算法带精英策略的非支配遗传算法0 129浏览会员免费
- 数据库大小:5MBARIES - A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging.pdf Algorithm for Recouery and Isolation Exploiting Semantics), which supports partial rollbacks of transactions, finegranularity (e.g., record) locking and recovery using write-ahead logging (WAL). We introduce the paradigm of repeating history to redo all missing updates before performing the rollbacks of the loser transactions during restart after a system failure.ARIES - A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging.pdf Algorithm for Recouery and Isolation Exploiting Semantics), which supports partial rollbacks of transactions, finegranularity (e.g., record) locking and recovery using write-ahead logging (WAL). We introduce the paradigm of repeating history to redo all missing updates before performing the rollbacks of the loser transactions during restart after a system failure.5 106浏览会员免费
- 数据库大小:111KBDB - A Critique of ANSI SQL Isolation Levels.pdf ANSI SQL-92 [MS, ANSI] defines Isolation Levels in terms of phenomena: Dirty Reads, Non-Re-peatable Reads, and Phantoms. This document shows that these phenomena and the ANSI SQL definitions fail to characterize several popular isolation levels, including the standard locking implementations of the levels. Investigating the ambiguities of the phenomena leads to clearer definitions.DB - A Critique of ANSI SQL Isolation Levels.pdf ANSI SQL-92 [MS, ANSI] defines Isolation Levels in terms of phenomena: Dirty Reads, Non-Re-peatable Reads, and Phantoms. This document shows that these phenomena and the ANSI SQL definitions fail to characterize several popular isolation levels, including the standard locking implementations of the levels. Investigating the ambiguities of the phenomena leads to clearer definitions.5 59浏览会员免费
- 数据库大小:185KBDB - Unbounded Pipelining in Dynamically Reconfigurable Paxos Clusters.pdf Consensus is an essential ingredient of a faulttolerant distributed system systems. When equipped with a consensus algorithm a distributed system can act as a replicated state machine (RSM), duplicating its state across a cluster of redundant components to avoid the failure of any single component leading to a system-wide failure. Paxos and Raft are examples of algorithms for achieving distributed consensus.DB - Unbounded Pipelining in Dynamically Reconfigurable Paxos Clusters.pdf Consensus is an essential ingredient of a faulttolerant distributed system systems. When equipped with a consensus algorithm a distributed system can act as a replicated state machine (RSM), duplicating its state across a cluster of redundant components to avoid the failure of any single component leading to a system-wide failure. Paxos and Raft are examples of algorithms for achieving distributed consensus.5 72浏览会员免费
- 数据库大小:107KBDB - Towards Low Latency State Machine Replication for Uncivil Wide-area Networks.pdf We consider the problem of building state machines in a multi-site environment in which there is lack of trust between sites, but not within a site. This system model recognizes the fact that if a server is attacked, then there are larger issues at play than simply masking the failure of the server. We describe the design principles of a low-latency Byzantine state machine protocol, called RAMDB - Towards Low Latency State Machine Replication for Uncivil Wide-area Networks.pdf We consider the problem of building state machines in a multi-site environment in which there is lack of trust between sites, but not within a site. This system model recognizes the fact that if a server is attacked, then there are larger issues at play than simply masking the failure of the server. We describe the design principles of a low-latency Byzantine state machine protocol, called RAM5 55浏览会员免费
- 数据库大小:1MBState Machine Replication is More Expensive than Consensus.pdf Consensus and State Machine Replication (SMR) are generally considered to be equivalent problems. In certain system models, indeed, the two problems are computationally equivalent: any solution to the former problem leads to a solution to the latter, and vice versa. In this paper, we study the relation between consensus and SMR from a complexity perspective.State Machine Replication is More Expensive than Consensus.pdf Consensus and State Machine Replication (SMR) are generally considered to be equivalent problems. In certain system models, indeed, the two problems are computationally equivalent: any solution to the former problem leads to a solution to the latter, and vice versa. In this paper, we study the relation between consensus and SMR from a complexity perspective.5 51浏览会员免费
- 数据库大小:362KBDB - Paxos Replicated State Machines as the Basis of a High-Performance.pdf Conventional wisdom holds that Paxos is too expensive to use for high-volume, high-throughput, data-intensive applications. Consequently, fault-tolerant storage systems typically rely on special hardware, semantics weaker than sequential consistency, a limited update interface (such as append-only), primary-backup replication schemes that serialize all reads through the primary, clock synchronization for correctnessDB - Paxos Replicated State Machines as the Basis of a High-Performance.pdf Conventional wisdom holds that Paxos is too expensive to use for high-volume, high-throughput, data-intensive applications. Consequently, fault-tolerant storage systems typically rely on special hardware, semantics weaker than sequential consistency, a limited update interface (such as append-only), primary-backup replication schemes that serialize all reads through the primary, clock synchronization for correctness5 81浏览会员免费
- 数据库大小:712KBDB - Just Say NO to Paxos Overhead- Replacing Consensus with Network Ordering.pdf Distributed applications use replication, implemented by protocols like Paxos, to ensure data availability and transparently mask server failures. This paper presents a new approach to achieving replication in the data center without the performance cost of traditional methods. Our work carefully divides replication responsibility between the network and protocol layers.DB - Just Say NO to Paxos Overhead- Replacing Consensus with Network Ordering.pdf Distributed applications use replication, implemented by protocols like Paxos, to ensure data availability and transparently mask server failures. This paper presents a new approach to achieving replication in the data center without the performance cost of traditional methods. Our work carefully divides replication responsibility between the network and protocol layers.5 52浏览会员免费
- 数据库大小:503KBTitle : Designing Distributed Systems Using Approximate Synchrony in Data Center Networks.pdf Distributed systems are traditionally designed independently from the underlying network, making worst-case assumptions (e.g., complete asynchrony) about its behavior. However, many of today’s distributed applications are deployed in data centers, where the network is more reliable, predictable, and extensible. In these environments, it is possible to co-design distributed systems with their networkTitle : Designing Distributed Systems Using Approximate Synchrony in Data Center Networks.pdf Distributed systems are traditionally designed independently from the underlying network, making worst-case assumptions (e.g., complete asynchrony) about its behavior. However, many of today’s distributed applications are deployed in data centers, where the network is more reliable, predictable, and extensible. In these environments, it is possible to co-design distributed systems with their network5 48浏览会员免费
- 数据库大小:562KBDB - Consistency Tradeoffs in Modern Distributed Database System Design The CAP theorem’s impact on modern distributed database system design is more limited than is often perceived. Another tradeoff—between consistency and latency —has had a more direct influence on several well-known DDBSs. A proposed new formulation, PACELC, unifies this tradeoff with CAP.DB - Consistency Tradeoffs in Modern Distributed Database System Design The CAP theorem’s impact on modern distributed database system design is more limited than is often perceived. Another tradeoff—between consistency and latency —has had a more direct influence on several well-known DDBSs. A proposed new formulation, PACELC, unifies this tradeoff with CAP.5 48浏览会员免费
- 数据库大小:767KBDB - Challenges and Solutions for Fast Remote Memory Access.pdf Non-volatile main memory DIMMs (NVMMs), such as Intel’s Optane DC Persistent Memory modules, provide data durability with orders of magnitude higher performance than prior durable technologies. This paper explores the unique challenges that arise when building high-performance networked systems for NVMM. Compared to DRAM, we find that NVMMs have distinctive fundamental properties that pose unique challenges for networked accessDB - Challenges and Solutions for Fast Remote Memory Access.pdf Non-volatile main memory DIMMs (NVMMs), such as Intel’s Optane DC Persistent Memory modules, provide data durability with orders of magnitude higher performance than prior durable technologies. This paper explores the unique challenges that arise when building high-performance networked systems for NVMM. Compared to DRAM, we find that NVMMs have distinctive fundamental properties that pose unique challenges for networked access0 37浏览会员免费