2021
DOI: 10.1002/cpe.6549
|View full text |Cite
|
Sign up to set email alerts
|

Concurrency control for real‐time and mobile transactions: Historical view, challenges, and evolution of practices

Abstract: Recently, mobile computing has changed the way that spatial data and GIS are processed. Unlike wired and stand-alone GIS, now the trend has been switched from offline to real-time data processing using location aware services, such as GPS technology. The increased usage of location aware services in multiuser real-time environment has made transaction management incredibly significant. If the simultaneous query operations on the same data item are not handled intelligently then this results in data inconsisten… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 106 publications
0
6
0
Order By: Relevance
“…As discussed before, the tree-based indices have limitations such as unbalanced load, an overhead of locking the whole sub branch of tree, an overhead of excessive locking due to node overlap issue and dead space issue, an overhead of computationally expensive split/merge operations due to frequent location updates of moving objects. 26 In contrast to…”
Section: Background and Literature Reviewmentioning
confidence: 92%
See 4 more Smart Citations
“…As discussed before, the tree-based indices have limitations such as unbalanced load, an overhead of locking the whole sub branch of tree, an overhead of excessive locking due to node overlap issue and dead space issue, an overhead of computationally expensive split/merge operations due to frequent location updates of moving objects. 26 In contrast to…”
Section: Background and Literature Reviewmentioning
confidence: 92%
“…This is because the concurrent operations accessing the data simultaneously for read-only purpose will not make any changes to the data and thus the access will F I G U R E 6 Linear hashing. 26 be safe. However, in exclusive mode, once an exclusive lock is acquired by any operation against a shared resource, then it cannot be accessed by any other operation.…”
Section: Lock-based Concurrency Control and Corresponding Consistent ...mentioning
confidence: 96%
See 3 more Smart Citations