• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

On optimistic methods for concurrency control (1981)

Cached

  • Download as a PDF

Download Links

  • [www.seas.upenn.edu]
  • [www.cs.wisc.edu]
  • [pages.cs.wisc.edu]
  • [www.eecs.harvard.edu]
  • [ss.hnu.cn]
  • [ece.ut.ac.ir]
  • [www.cs.ucdavis.edu]
  • [www.seas.upenn.edu]
  • [ece.ut.ac.ir]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [www.cs.berkeley.edu]
  • [www.cs.purdue.edu]
  • [www.cs.purdue.edu]
  • [people.csail.mit.edu]
  • [www.eecs.berkeley.edu]
  • [www.collide.info]
  • [www.cs.berkeley.edu]
  • [daslab.seas.harvard.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by H. T. Kung , John T. Robinson
Venue:ACM Transactions on Database Systems
Citations:546 - 1 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

Citations

567 The notion of consistency and predicate locks in database systems. - Eswaran, Gary, et al. - 1976 (Show Context)

Citation Context

...nificantly lowered whenever it is necessary to leave some congested node locked (a congested node is one that is often accessed, e.g., the root of a tree) while waiting for a secondary memory access. =-=(4)-=- To allow a transaction to abort itself when mistakes occur, locks cannot be released until the end of the transaction. This may again significantly lower concurrency. (5) Most important for the purpo...

310 Notes on database operating systems. - GRAY - 1978 (Show Context)

Citation Context

...r a secondary memory access. (4) To allow a transaction to abort itself when mistakes occur, locks cannot be released until the end of the transaction. This may again significantly lower concurrency. =-=(5)-=- Most important for the purposes of this paper, locking may be necessary only in the worst case. Consider the following simple example: The directed graph consists solely of roots, and each transactio...

282 Organization and maintenance of large ordered indexes - Bayer, McCreight - 1972 (Show Context)

Citation Context

...he data is called a transaction (see, e.g., [4]). If our goal is to maximize the throughput of accesses to the database, then there are at least two cases where highly concurrent access is desirable. =-=(1)-=- The amount of data is sufficiently great that at any given time only a fraction of the database can be present in primary memory, so that it is necessary to swap parts of the database from secondary ...

177 Efficient locking for concurrent operations on B-trees. - LEHMAN, YAO - 1981
115 Concurrency of Operations on B-Trees. - Bayer, Schkolnick - 1977 (Show Context)

Citation Context

...a is sufficiently great that at any given time only a fraction of the database can be present in primary memory, so that it is necessary to swap parts of the database from secondary memory as needed. =-=(2)-=- Even if the entire database can be present in primary memory, there may be multiple processors. In both cases the hardware will be underutilized if the degree of concurrency is too low. However, as i...

55 Concurrent manipulation of binary search trees. - Kung, Lehman - 1980
36 Concurrency search and insertion in 2-3 trees - Ellis - 1980 (Show Context)

Citation Context

... been directed at developing special-purpose locking protocols for various special cases. For example, in the case of B-trees [l], at least nine locking protocols have been proposed [2, 3,9, 10, 131. =-=(3)-=- In the case that large parts of the database are on secondary memory, concurrency is significantly lowered whenever it is necessary to leave some congested node locked (a congested node is one that i...

26 Concurrency controls for database systems - Stearn, Lewis, et al. - 1976 (Show Context)

Citation Context

... PHASE A widely used criterion for verifying the correctness of concurrent execution of transactions has been variously called serial equivalence [4], serial reproducibility [ll], and linearizability =-=[14]-=-. This criterion may be defined as follows. Let transactions Tl, TX, . . . ,T, be executed concurrently. Denote an instance of the shared data structure by d, and let D be the set of all possible d, s...

23 B-trees in a system with multiple users - SAMADI - 1976
16 An optimality theory of concurrency control for databases. - Kung, Papadimitriou - 1979 (Show Context)

Citation Context

...d (b) every concurrent execution of transaction is serially equivalent than it is to verify directly that every concurrent execution of transactions preserves integrity. In fact, it has been shown in =-=[7]-=- that serialization is the weakest criterion for preserving consistency of a concurrent transaction system, even if complete syntactic information of the system is available to the concurrency control...

15 Towards a Theory of Correctness of Multi-user Database Systems - Lamport - 1976
15 The Serializability of Concurrent Updates - Papadimitriou - 1979 (Show Context)

Citation Context

...before Tj starts writing; it simply requires that Ti not affect the read phase or the write phase of Tj (again note that T; cannot affect the read phase of Ti, by the last part of the condition). See =-=[12]-=- for a set of similar conditions for serialization. ACM Transactions on Database Systems, Vol. 6, No. 2, June 1981.srj)--f--t---l (2) r;.t--+-H 3.2 Assigning Transaction Numbers Optimistic Methods for...

10 Some computational problems related to database concurrency control - PAPADIMITRIOU, BERNSTEIN, et al. - 1977
1 Multiple access to B-trees. Presented at - MILLER, SNYDER - 1978
1 On random 2-3 trees. Acta Ini 2,9 - YAO - 1978
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University