Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

On transactional concurrency control / (Record no. 562420)

000 -LEADER
fixed length control field 07589nam a2201117 i 4500
001 - CONTROL NUMBER
control field 8737907
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152932.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190630s2019 caua fob 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781681735498
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781681735504
Qualifying information hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781681735481
Qualifying information paperback
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00912ED2V01Y201904DTM059
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)thg00979212
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1107283226
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.545
Item number .G736 2019eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005/.74
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Graefe, Goetz,
Relator term author.
245 10 - TITLE STATEMENT
Title On transactional concurrency control /
Statement of responsibility, etc. Goetz Graefe.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [San Rafael, California] :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2019.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xxi, 381 pages) :
Other physical details illustrations (some color).
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on data management,
International Standard Serial Number 2153-5426 ;
Volume/sequential designation #59
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note part I. Published papers. 1. A survey of B-tree locking techniques -- 1.1. Introduction -- 1.2. Preliminaries -- 1.3. Two forms of B-tree locking -- 1.4. Protecting a B-tree's physical structure -- 1.5. Protecting a B-tree's logical contents -- 1.6. Future directions -- 1.7. Summary and conclusions -- 1.8. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Hierarchical locking in B-tree indexes -- 2.1. Introduction -- 2.2. Related work -- 2.3. Assumptions -- 2.4. Traditional locking hierarchies -- 2.5. Locks on separator keys -- 2.6. Locks on key prefixes -- 2.7. Summary and conclusions -- 2.8. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Concurrent queries and updates in summary views and their indexes -- 3.1. Introduction -- 3.2. Prior work -- 3.3. Multi-version snapshot isolation -- 3.4. Concurrent updates and linear version history -- 3.5. Logging and recovery -- 3.6. Multi-granularity locking -- 3.7. Update and upgrade locks -- 3.8. Insert and delete -- 3.9. Online index operations -- 3.10. Correctness -- 3.11. Performance -- 3.12. Summary and conclusions -- 3.13. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Controlled lock violation / Goetz Graefe, Mark Lillibridge, Harumi Kuno, Joseph Tucek, and Alistair Veitch -- 4.1. Introduction -- 4.2. Related prior work -- 4.3. Controlled lock violation -- 4.4. Distributed transactions -- 4.5. Canned transactions -- 4.6. Performance evaluation -- 4.7. Discussion -- 4.8. Summary and conclusions -- 4.9. Acknowledgements -- 4.10. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Orthogonal key-value locking -- 5.1. Introduction -- 5.2. Prior designs -- 5.3. Orthogonal key-value locking -- 5.4. Case studies -- 5.5. Future opportunities -- 5.6. Conclusions -- 5.7. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note part II. Optimistic concurrency control. 6. Orthogonal key-value validation -- 6.1. Introduction -- 6.2. Related prior work -- 6.3. Orthogonal key-value validation -- 6.4. Case studies -- 6.5. Alternative approaches -- 6.6. Conclusions -- 6.7. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 7. Serializable timestamp validation -- 7.1. Introduction -- 7.2. Related prior work -- 7.3. Phantom protection with timestamp validation -- 7.4. Management of timestamps -- 7.5. Hierarchical timestamps -- 7.6. Conclusions -- 7.7. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8. Repairing optimistic concurrency control -- 8.1. Introduction -- 8.2. Related prior work -- 8.3. Concurrent validation -- 8.4. Premature publication -- 8.5. Distributed transactions -- 8.6. Conclusions -- 8.7. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note part III. Locking. 9. Avoiding index-navigation deadlocks -- 9.1. Introduction -- 9.2. Related prior work -- 9.3. Recommended locking sequences -- 9.4. Conclusions -- 9.5. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 10. A problem in two-phase commit -- 10.1. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 11. Deferred lock enforcement -- 11.1. Introduction -- 11.2. Related prior work -- 11.3. Deferred lock acquisition -- 11.4. Deferred lock enforcement -- 11.5. Deferred lock enforcement and other techniques -- 11.6. Distributed operations -- 11.7. Summary and conclusions -- 11.8. References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note part IV. The end of optimistic concurrency control. 12. The end of optimistic concurrency control -- 12.1. Introduction -- 12.2. Earlier comparisons -- 12.3. Common misconceptions -- 12.4. Locking in optimistic concurrency control -- 12.5. Advantage : locking -- 12.6. Another quick look at optimistic concurrency control -- 12.7. Recommendations -- 12.8. Conclusions -- 12.9. References.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 ## - SUMMARY, ETC.
Summary, etc. This book contains a number of chapters on transactional database concurrency control. A two-sentence summary of the volume's entire sequence of chapters is this: traditional locking techniques can be improved in multiple dimensions, notably in lock scopes (sizes), lock modes (increment, decrement, and more), lock durations (late acquisition, early release), and lock acquisition sequence (to avoid deadlocks). Even if some of these improvements can be transferred to optimistic concurrency control, notably a fine granularity of concurrency control with serializable transaction isolation including phantom protection, pessimistic concurrency control is categorically superior to optimistic concurrency control, i.e., independent of application, workload, deployment, hardware, and software implementation.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on June 26, 2019).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Transaction systems (Computer systems)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term concurrency
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term concurrency control
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term database
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term update
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term transaction
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term serializability
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term phantom protection
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term locking
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term index
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term b-tree
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term key-range locking
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term key-value locking
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term deadlock avoidance
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term lock acquisition sequence
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term pessimistic concurrency control
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term optimistic concurrency control
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term validation
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term timestamps
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term snapshot isolation
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term versioning
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term multi-version storage
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term write buffer
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term distributed systems
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term mirroring
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term replication
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term log shipping
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term two-phase commit
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term three-phase commit
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term controlled lock violation
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term deferred lock acquisition
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term deferred lock enforcement
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term weak lock enforcement
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term reserved locks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term pending locks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term orthogonal key-range locking
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term orthogonal key-value locking
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term partitioning
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781681735481
-- 9781681735504
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on data management ;
Volume/sequential designation #59.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to full text
Uniform Resource Identifier https://doi.org/10.2200/S00912ED2V01Y201904DTM059
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=8737907
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE920 2020-04-13 2020-04-13 E books

Powered by Koha