Fig. 2From: Research on recovery strategy in embedded real-time main memory databasesComparison of log buffer utilizationBack to article page