Safe replication through bounded concurrency verification.
Gowtham KakiKapil EarankyK. C. SivaramakrishnanSuresh JagannathanPublished in: Proc. ACM Program. Lang. (2018)
Keyphrases
- distributed databases
- concurrency control
- fault tolerant
- database systems
- model checking
- data replication
- formal verification
- concurrency control protocols
- verification method
- fault tolerance
- face verification
- continuous functions
- formal methods
- data availability
- nested transactions
- object oriented languages
- dynamic allocation
- signature verification
- data partitioning
- formal analysis
- neural network
- transaction processing
- data flow
- peer to peer
- case study
- information systems