000 | 07589nam a2201117 i 4500 | ||
---|---|---|---|
001 | 8737907 | ||
003 | IEEE | ||
005 | 20200413152932.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 190630s2019 caua fob 000 0 eng d | ||
020 |
_a9781681735498 _qelectronic |
||
020 |
_z9781681735504 _qhardcover |
||
020 |
_z9781681735481 _qpaperback |
||
024 | 7 |
_a10.2200/S00912ED2V01Y201904DTM059 _2doi |
|
035 | _a(CaBNVSL)thg00979212 | ||
035 | _a(OCoLC)1107283226 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aQA76.545 _b.G736 2019eb |
|
082 | 0 | 4 |
_a005/.74 _223 |
100 | 1 |
_aGraefe, Goetz, _eauthor. |
|
245 | 1 | 0 |
_aOn transactional concurrency control / _cGoetz Graefe. |
264 | 1 |
_a[San Rafael, California] : _bMorgan & Claypool, _c2019. |
|
300 |
_a1 PDF (xxi, 381 pages) : _billustrations (some color). |
||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aSynthesis lectures on data management, _x2153-5426 ; _v#59 |
|
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat Reader. | ||
500 | _aPart of: Synthesis digital library of engineering and computer science. | ||
504 | _aIncludes bibliographical references. | ||
505 | 0 | _apart I. Published papers. 1. A survey of B-tree locking techniques -- 1.1. Introduction -- 1.2. Preliminaries -- 1.3. Two forms of B-tree locking -- 1.4. Protecting a B-tree's physical structure -- 1.5. Protecting a B-tree's logical contents -- 1.6. Future directions -- 1.7. Summary and conclusions -- 1.8. References | |
505 | 8 | _a2. Hierarchical locking in B-tree indexes -- 2.1. Introduction -- 2.2. Related work -- 2.3. Assumptions -- 2.4. Traditional locking hierarchies -- 2.5. Locks on separator keys -- 2.6. Locks on key prefixes -- 2.7. Summary and conclusions -- 2.8. References | |
505 | 8 | _a3. Concurrent queries and updates in summary views and their indexes -- 3.1. Introduction -- 3.2. Prior work -- 3.3. Multi-version snapshot isolation -- 3.4. Concurrent updates and linear version history -- 3.5. Logging and recovery -- 3.6. Multi-granularity locking -- 3.7. Update and upgrade locks -- 3.8. Insert and delete -- 3.9. Online index operations -- 3.10. Correctness -- 3.11. Performance -- 3.12. Summary and conclusions -- 3.13. References | |
505 | 8 | _a4. Controlled lock violation / Goetz Graefe, Mark Lillibridge, Harumi Kuno, Joseph Tucek, and Alistair Veitch -- 4.1. Introduction -- 4.2. Related prior work -- 4.3. Controlled lock violation -- 4.4. Distributed transactions -- 4.5. Canned transactions -- 4.6. Performance evaluation -- 4.7. Discussion -- 4.8. Summary and conclusions -- 4.9. Acknowledgements -- 4.10. References | |
505 | 8 | _a5. Orthogonal key-value locking -- 5.1. Introduction -- 5.2. Prior designs -- 5.3. Orthogonal key-value locking -- 5.4. Case studies -- 5.5. Future opportunities -- 5.6. Conclusions -- 5.7. References | |
505 | 8 | _apart II. Optimistic concurrency control. 6. Orthogonal key-value validation -- 6.1. Introduction -- 6.2. Related prior work -- 6.3. Orthogonal key-value validation -- 6.4. Case studies -- 6.5. Alternative approaches -- 6.6. Conclusions -- 6.7. References | |
505 | 8 | _a7. Serializable timestamp validation -- 7.1. Introduction -- 7.2. Related prior work -- 7.3. Phantom protection with timestamp validation -- 7.4. Management of timestamps -- 7.5. Hierarchical timestamps -- 7.6. Conclusions -- 7.7. References | |
505 | 8 | _a8. Repairing optimistic concurrency control -- 8.1. Introduction -- 8.2. Related prior work -- 8.3. Concurrent validation -- 8.4. Premature publication -- 8.5. Distributed transactions -- 8.6. Conclusions -- 8.7. References | |
505 | 8 | _apart III. Locking. 9. Avoiding index-navigation deadlocks -- 9.1. Introduction -- 9.2. Related prior work -- 9.3. Recommended locking sequences -- 9.4. Conclusions -- 9.5. References | |
505 | 8 | _a10. A problem in two-phase commit -- 10.1. References | |
505 | 8 | _a11. Deferred lock enforcement -- 11.1. Introduction -- 11.2. Related prior work -- 11.3. Deferred lock acquisition -- 11.4. Deferred lock enforcement -- 11.5. Deferred lock enforcement and other techniques -- 11.6. Distributed operations -- 11.7. Summary and conclusions -- 11.8. References | |
505 | 8 | _apart IV. The end of optimistic concurrency control. 12. The end of optimistic concurrency control -- 12.1. Introduction -- 12.2. Earlier comparisons -- 12.3. Common misconceptions -- 12.4. Locking in optimistic concurrency control -- 12.5. Advantage : locking -- 12.6. Another quick look at optimistic concurrency control -- 12.7. Recommendations -- 12.8. Conclusions -- 12.9. References. | |
506 | _aAbstract freely available; full-text restricted to subscribers or individual document purchasers. | ||
510 | 0 | _aCompendex | |
510 | 0 | _aINSPEC | |
510 | 0 | _aGoogle scholar | |
510 | 0 | _aGoogle book search | |
520 | _aThis book contains a number of chapters on transactional database concurrency control. A two-sentence summary of the volume's entire sequence of chapters is this: traditional locking techniques can be improved in multiple dimensions, notably in lock scopes (sizes), lock modes (increment, decrement, and more), lock durations (late acquisition, early release), and lock acquisition sequence (to avoid deadlocks). Even if some of these improvements can be transferred to optimistic concurrency control, notably a fine granularity of concurrency control with serializable transaction isolation including phantom protection, pessimistic concurrency control is categorically superior to optimistic concurrency control, i.e., independent of application, workload, deployment, hardware, and software implementation. | ||
530 | _aAlso available in print. | ||
588 | _aTitle from PDF title page (viewed on June 26, 2019). | ||
650 | 0 | _aTransaction systems (Computer systems) | |
653 | _aconcurrency | ||
653 | _aconcurrency control | ||
653 | _adatabase | ||
653 | _aupdate | ||
653 | _atransaction | ||
653 | _aserializability | ||
653 | _aphantom protection | ||
653 | _alocking | ||
653 | _aindex | ||
653 | _ab-tree | ||
653 | _akey-range locking | ||
653 | _akey-value locking | ||
653 | _adeadlock avoidance | ||
653 | _alock acquisition sequence | ||
653 | _apessimistic concurrency control | ||
653 | _aoptimistic concurrency control | ||
653 | _avalidation | ||
653 | _atimestamps | ||
653 | _asnapshot isolation | ||
653 | _aversioning | ||
653 | _amulti-version storage | ||
653 | _awrite buffer | ||
653 | _adistributed systems | ||
653 | _amirroring | ||
653 | _areplication | ||
653 | _alog shipping | ||
653 | _atwo-phase commit | ||
653 | _athree-phase commit | ||
653 | _acontrolled lock violation | ||
653 | _adeferred lock acquisition | ||
653 | _adeferred lock enforcement | ||
653 | _aweak lock enforcement | ||
653 | _areserved locks | ||
653 | _apending locks | ||
653 | _aorthogonal key-range locking | ||
653 | _aorthogonal key-value locking | ||
653 | _apartitioning | ||
776 | 0 | 8 |
_iPrint version: _z9781681735481 _z9781681735504 |
830 | 0 | _aSynthesis digital library of engineering and computer science. | |
830 | 0 |
_aSynthesis lectures on data management ; _v#59. |
|
856 | 4 | 0 |
_3Abstract with links to full text _uhttps://doi.org/10.2200/S00912ED2V01Y201904DTM059 |
856 | 4 | 2 |
_3Abstract with links to resource _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=8737907 |
999 |
_c562420 _d562420 |