Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,298,513 papers from all fields of science
Search
Sign In
Create Free Account
Read–write conflict
Known as:
Read-Write conflict
, Unrepeatable reads
In computer science, in the field of databases, read–write conflict, also known as unrepeatable reads, is a computational anomaly associated with…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Alice and Bob
Computer science
Concurrency control
Critical section
Expand
Broader (1)
Transaction processing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Correlated Material Enhanced SRAMs With Robust Low Power Operation
S. Srinivasa
,
Ahmedullah Aziz
,
+6 authors
S. Gupta
IEEE Transactions on Electron Devices
2016
Corpus ID: 30737662
We propose a novel static random access memory (SRAM) cell employing correlated material (CM) films in conjunction with the…
Expand
2015
2015
SIRe: an efficient snapshot isolation-based memory model for detecting and tolerating region conflicts
Minjia Zhang
ACM SIGPLAN International Conference on Systems…
2015
Corpus ID: 32522349
A strong memory model, such as region serializability, helps programmers reason about programs in the granularity of…
Expand
2013
2013
Concurrency Control Mechanism for Nested Transactions in Mobile Environment
Nyo Nyo Yee
2013
Corpus ID: 4918196
In mobile environment, mobile host can initiate transactions and that transactions may be executed at mobile host or fixed host…
Expand
2009
2009
Efficient Dynamic Verification of Concurrent Programs
Yu Yang
2009
Corpus ID: 64250817
Revealing concurrency errors in multithreaded programs is difficult. Many "unexpected" thread interactions can only be manifested…
Expand
2008
2008
On Supporting Integrity Constraints in Relational Database Replication Protocols
F. D. Mu˜noz
,
H. Decker
,
J. E. Armend´ariz
,
J. R. G. D. Mend´ıvil
2008
Corpus ID: 14491822
Current database replication protocols take care of read-write conflict evaluation. If there are no such conflicts, protocols…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE