Author:
Xiao Yingyuan,Liu Yunsheng,Chen Xiangyang,Liu Xiaofeng
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Sivasankaran, R.M., Stankovic, K., Stankovic, J., et al.: Data placement, logging and recovery in real-time active database. In: International Workshop on Active and Real-time Database Systems (June 1995)
2. Lam, K.Y., Kuo, T.W.: Real-time database architecture and techniques, 1st edn. Kluwer Academic Publishers, Boston (2001)
3. Lecture Notes in Computer Science;R. Agrawal,1989
4. Liu, P., Ammann, P., Jajodia, S.: Rewriting histories: Recovering from malicious transactions. Distributed and Parallel Databases 8(1), 7–40 (2000)
5. Panda, B., Tripathy, S.: Data dependency based logging for defensive information warfare. In: Proceedings of the 2000 ACM symposium on Applied computing, pp. 361–365 (2000)