Granular Locking Approach to Phantom Protection in R - trees

نویسندگان

  • Kaushik Chakrabarti
  • Sharad Mehrotra
چکیده

Over the last decade, the R-tree has emerged as one of the most robust multidimensional access methods. However, before the R-tree can be integrated as an access method to a commercial strength database management system, eecient techniques to provide transactional access to data via R-trees need to be developed. Concurrent access to data through a multidi-mensional data structure introduces the problem of protecting ranges speciied in the retrieval from phantom insertions and deletions (the phantom problem). Existing approaches to phantom protection in B-trees (namely, key-range locking) cannot be applied to multidimensional data structures since they rely on a total order over the key space on which the B-tree is designed. This paper presents a dynamic granular locking approach to phantom protection in R-trees. To the best of our knowledge, this paper provides the rst solution to the phantom problem in multidimensional access methods based on granular locking.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Granular Locking Approach to Phantom Protection in R-Trees

Over the last decade, the R-tree has emerged as one of the most robust multidimensional access methods. However, before the R-tree can be integrated as an access method to a commercial strength database management system, e cient techniques to provide transactional access to data via R-trees need to be developed. Concurrent access to data through a multidimensional data structure introduces the...

متن کامل

Combinational Approach for Object Clipping Using GLIP and Protection Against Sql Injection Attacks

Multidimensional databases are being used in a wide range of applications. To meet this fast-growing demand,R+ trees were used that exhibit outstanding search performance. In order to support efficient concurrent access in multiuser environments, concurrency control mechanisms for multidimensional indexing have been proposed. However, these mechanisms cannot be directly applied to the R+-tree b...

متن کامل

Orthogonal key-value locking

B-trees have been ubiquitous for decades; and over the past 20 years, record-level locking has been ubiquitous in b-tree indexes. There are multiple designs, each a different tradeoff between (i) high concurrency and a fine granularity of locking for updates, (ii) efficient coarse locks for equality and range queries, (iii) run time efficiency with the fewest possible invocations of the lock ma...

متن کامل

Evaluation of Phase Locking and Cross Correlation Methods for Estimating the Time Lag between Brain Sites: A Simulation Approach

Introduction: Direction and latency of electrical connectivity between different sites of brain explains brain neural functionality. We compared efficiency of cross correlation and phase locking methods in time lag estimation which are based on local field potential (LFP) and LFPspike signals, respectively. Methods: Signals recorded from MT area of a macaque’s brain was used in a simulation ...

متن کامل

A New Hybrid Predicate-Assertion-Index-Locking (PAX) Algorithm to Prevent Transactional Phantoms

We discuss three forms of phantom prevention locking that have been proposed in the literature: (1) predicate locking [EGLT76], (2) precision locking [JBB81], and (3) index locking (specifically, KVL/IM locking [MOHAN90, MOHAN92, MOHAN96]). The predicate locking method was dropped from consideration in System R because of perceived problems [CHETAL81]. The precision locking technique was propos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998