• Title/Summary/Keyword: false conflict

Search Result 16, Processing Time 0.023 seconds

Performance Evaluation of Conflict Detection Schemes for Concurrent Temporal Tranactions (시간지원 크랙잭션을 위한 충돌 검출 기법의 성능평가)

  • 구경이;하봉옥;김유성
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.1
    • /
    • pp.80-80
    • /
    • 1999
  • As Temporal DataBase Systems(TDBSs) manages both the historical versions and the current version of each data item, a temporal transaction may access more data records than atransaction in traditional database systems. Hence, the concurrency control subsystem of temporaldatabase management system should be able to correctly and efficiently detect actual conflicts amongconcurrent temporal transactions while the cost of detecting conflicts is maintained in low levelwithout detecting false conflicts which cause severe degradation of system throughput.In this paper, Two-Level Conflict Detection(TLCD) scheme is proposed for efficient conflictdetection between concurrent temporal transactions in TDBs. In the proposed TLCD scheme, sincechecking conflict between concurrent temporal transactions is performed at two levels, i, e., logicallevel and physical level, conflicts between concurrent temporal transactions are efficiently and correctlydetected,Furthermore, we also evaluate the performance of the proposed TLCD scheme with those oftraditional conflict detection schemes, logical-level conflict detection scheme and physical-level conflictdetection scheme by simulation approach, The result of the simulation study shows that the proposedTLCD scheme outperforms the previous conflict detection schemes with respect to the averageresponse time.

Using Cache Access History for Reducing False Conflicts in Signature-Based Eager Hardware Transactional Memory (시그니처 기반 이거 하드웨어 트랜잭셔널 메모리에서의 캐시 접근 이력을 이용한 거짓 충돌 감소)

  • Kang, Jinku;Lee, Inhwan
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.442-450
    • /
    • 2015
  • This paper proposes a method for reducing false conflicts in signature-based eager hardware transactional memory (HTM). The method tracks the information on all cache blocks that are accessed by a transaction. If the information provides evidence that there are no conflicts for a given transactional request from another core, the method prevents the occurrence of a false conflict by forcing the HTM to ignore the decision based on the signature. The method is very effective in reducing false conflicts and the associated unnecessary transaction stalls and aborts, and can be used to improve the performance of the multicore processor that implements the signature-based eager HTM. When running the STAMP benchmark on a 16-core processor that implements the LogTM-SE, the increased speed (decrease in execution time) achieved with the use of the method is 20.6% on average.

Effects of the Manner of Deleting Typical Items in a Scene on False Memory (풍경 그림에서 전형적인 정보의 삭제 방법이 오기억에 미치는 영향)

  • Do, Kyung-Soo;Bae, Kyung-Sue
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.2
    • /
    • pp.113-138
    • /
    • 2007
  • The effects of schema on accurate and false memories of items in a scene were investigated in two experiments: Recognition of items in a scene was tested immediately in Experiment 1 and three days later in Experiment 2. In both experiments, the following three variables were manipulated: Exposure time (250ms or 10000ms), picture mode (completed pictures or scrambled pictures), and manipulation mode (missing item or substituted item). Experiment 1 had yielded three important results: First, although accurate memory for presented items got increased when the exposure time was longer, false memory of the critical lures was not changed. Second, false memory of critical lures in the missing condition, where there was not any conflict between verbatim information and gist information, was higher than that of the substituted condition, where verbatim information of the item that replaced the lure was in conflict with the gist information. Third, accurate memory for atypical items in the substituted rendition, which had replaced the critical lures and in conflict with the schema, was higher than that in the missing condition. In Experiment 2, recognition test were administered 72 hours after the participants saw the picture. The three effects mentioned in Experiment 1 had disappeared in Experiment 2. The results of Experiment 2 might be due to the selective weakening of verbatim information compared to the persistence of the gist (or schematic) information. The results of Experiments 1 and 2 showed that false memory of critical lures is more persistent than the accurate memory of non-critical information. Theoretical implications of the results were considered in terms of the function of the verbatim and gist information.

  • PDF

Performance Evaluation of Conflict Detection Schemes for Concurrent Temporal Transactions (시간지원 트랜잭션을 위한 충돌 검출 기법의 성능평가)

  • 구경이;하봉욱;김유성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.220-222
    • /
    • 1998
  • 시간지원 데이터베이스 시스템은 각 데이터 항목에 대해 현재 비젼뿐만 아니라 이력 버전들까지도 관리하기 때문에 시간지원 트랜잭션은 기존 데이터베이스 시스템의 트랜잭션보다 더 많은 데이터 레코드들을 액세스한다. 그러므로, 시간지원 데이터베이스 관리 시스템은 시간지원 트랜젝션들간의 충돌을 최소의 비용으로 검출하면서도 시스템 전체 성능의 저하를 유발하는 거짓 충돌(false conflict)을 검출하지 않고 실제 충돌을 정확하고 효율적으로 검출할 수 있어야 한다. 본 논문에서는 시간지원 데이터베이스 시스템에서 동시적으로 실행되는 시간지원 트랜잭션들간의 효율적인 충돌 검출 기법으로서 2레벨 충돌 검출 기법을 제안하고, 모의 실험을 통하여 기존의 충돌 검출 기법들과 성능을 비교 분석하였다. 실험 분석의 결과로서 제안된 2레벨 충돌 검출 기법은 기존의 검출 기법들보다 동시적으로 실행되는 시간지원 트랜잭션들간의 충돌을 적은 비용으로 정확하게 검출할 수 있는 효율성이 입증되었다.

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

Development on Intrusion Detection, Based on Blackboard Architecture (Blackboard 기반의 침입탐지 시스템 개발)

  • Shin, Woo-Chul;Choi, Jong-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.454-460
    • /
    • 2000
  • In this paper, an architecture is suggested which efficiently detects intrusions in network environments. In the architecture, the Blackboardbased agent coordinates opinions of several independent agents which are performing unique functions, by resolving conflicts and reconfirming notices of intrusion. In the simulation, it was found that conventional agents judge simple resource access activities as 'intrusion' while blakcboard-based agent reserves the judgement until additional information confirms notices of independent agents. Reconfirmation process based on additional questioning will roduce positive errors.

  • PDF

The Effect of Franchisors' Gapjil on Economic Satisfaction, Social Satisfaction, and Recontract Intention

  • HUR, Soon-Beom;LEE, Yong-Ki
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.2
    • /
    • pp.35-49
    • /
    • 2021
  • Purpose: The major objective of this study is to develop a model for the impact of franchisors' Gapjil (verbal·nonverbal Gapjil, abusing bargaining position, refusing transaction, false or exaggerated information, restrictive practices, unfair damage compensation) on franchisee's recontract intention. We also examine the mediating role of economic satisfaction and social satisfaction in the relationship between franchisors' Gapjil and franchisee's contract intention. Research design, data, and methodology: Data were collected from franchisee owners located nationwide in Korea. Out of 256 questionaires distributed, a total of 256 questionnaires were returned. After excluding 10 invalid respondent questionnaires, we coded and analyzed 246 valid questionnaires (effective response rate of 96.09%) using frequency, confirmatory factor analysis, correlations analysis, and structural equation modeling with SPSS 22.O and SmartPLS 3.0. Results: The findings of this study are summarized as follows: First, among the Gapjil of the franchisors, restrictive practices and unfair damage compensation had negative effects on economic and social satisfaction, but verbal and nonverbal Gapjil for economic and social satisfaction was not significant. Second, abusing bargaining positions and false or exaggerated information had negative effects on social satisfaction, but for economic satisfaction, found to be insignificant. Third, economic and social satisfaction had positive effects on the franchisee's recontract intention to the franchisor. Conclusion: The following implications of this study are as follows. First, the construct of Gapjil that occurs between the franchisors and the franchisees was first presented, and the franchisors' Gapjil is divided into interpersonal Gapjil and structural Gapjil. Second, the Gapjil of the franchisors can be an important predictor variable in maintaining and developing a long-term relationship between the franchisors and the franchisees. Third, solving conflict due to the Gapjil problem between franchisors and franchisees can be an important factor for franchisors and franchisees to co-survive and thrive in Korean franchise system. Fourth, this study suggest that managing the Gapjil of the franchisors was a important antecedent factor in maintaining long-term relationship between the franchisors and the franchisees. Therefore, this study will help franchisors formulate effective symbiotic marketing strategies to satisfy relationships with franchisees and consequently enhance long-term orientation.

The Unconscious Desire and the Conflict between Mother and Daughter -A Convergence In-depth Psychological Analysis of the Film, 'DAUGHTER'- (모녀의 무의식적 욕망과 갈등 -영화 '다우더'의 융복합 심층심리학적 분석-)

  • Lee, Chang-Don;Lee, Hyun-Sim
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.437-447
    • /
    • 2016
  • This study is intended to analyze the conflict between the mother and the daughter revealed in the film, 'Daughter' and tries to suggest the therapeutic counseling techniques in the integrated perspective. It used a convergence in-depth psychological method. After deriving the unconscious conflicts of main characters through several film reviews, it was found that at the unconscious level true self and the false self, the ego ideal and the super ego, the individuation and the dependency are in mutual struggle. For Therapeutic counselling, the most important thing in the initial stage of the counselling is the experience of authenticity. The counsellor himself or herself should establish the right life values and stimulate the ego-ideal and strengthen the drive of true self. Also the counsellor should be aware of the dangers of the religious behavior as the transitional phenomenon. In the final stage, the counselor expects the client to continue to make efforts to change with the hope for the well-being.

A Study on Players' Desire in Cheating Programs of Online Game - Focused on Shooter Games (온라인 게임의 치팅 프로그램에 나타난 플레이어의 욕망 - 슈팅 장르를 중심으로)

  • Ahn, Jin-Kyoung
    • Journal of Korea Game Society
    • /
    • v.20 no.4
    • /
    • pp.89-100
    • /
    • 2020
  • The purpose of this study is to identify online-game players' desire in cheating programs through Rene Girard's theory of mimetic desire. Cheating programs disrupts the magic circle of the game with denying the lusory attitude that players should have. The cheating players' desires do not go directly to victory, but are mediated by a virtual 'model player' which the rules of the game imply. They are internally mediated, so there is constant conflict in the play. Cheating players' desire to enhance skills by technology is defined as a false desire for transhuman.

Management of Neighbor Cell Lists and Physical Cell Identifiers in Self-Organizing Heterogeneous Networks

  • Lim, Jae-Chan;Hong, Dae-Hyoung
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.367-376
    • /
    • 2011
  • In this paper, we propose self-organizing schemes for the initial configuration of the neighbor cell list (NCL), maintenance of the NCL, and physical cell identifier (PCI) allocation in heterogeneous networks such as long term evolution systems where lower transmission power nodes are additionally deployed in macrocell networks. Accurate NCL maintenance is required for efficient PCI allocation and for avoiding handover delay and redundantly increased system overhead. Proposed self-organizing schemes for the initial NCL configuration and PCI allocation are based on evolved universal terrestrial radio access network NodeB (eNB) scanning that measures reference signal to interference and noise ratio and reference symbol received power, respectively, transmitted from adjacent eNBs. On the other hand, the maintenance of the NCL is managed by adding or removing cells based on periodic user equipment measurements. We provide performance analysis of the proposed schemes under various scenarios in the respects of NCL detection probability, NCL false alarm rate, handover delay area ratio, PCI conflict ratio, etc.